Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber Operations (3)
- Cyber defense (3)
- Nukes (3)
- Austerity (2)
- Cyber (2)
-
- Cyber operations (2)
- Deterrence (2)
- Nuclear (2)
- Security Studies (2)
- Sequestration (2)
- 2nd term (1)
- Android (1)
- Armed forces (1)
- Budget (1)
- Community Resiliency (1)
- Counter cyber (1)
- Critical Infrastructure Assurance (1)
- Critical Infrastructure Protection (1)
- Cyber Deterrence (1)
- Cyber Operations in Space (1)
- Cyber Security (1)
- Cyber defense workforce (1)
- Cyber deterrence (1)
- Cyber security (1)
- Cyber space (1)
- Cyber terrorism (1)
- Cyberwar (1)
- EMI/EMC Protection (1)
- Education (1)
- Electric Power Grid EMP and GMD Protection (1)
Articles 1 - 11 of 11
Full-Text Articles in Engineering
National Infrastructure Protection Priorities For Nuclear Electromagnetic Pulse (Emp) And Solar Storm Geomagnetic Disturbance Catastrophes, George H. Baker Iii
National Infrastructure Protection Priorities For Nuclear Electromagnetic Pulse (Emp) And Solar Storm Geomagnetic Disturbance Catastrophes, George H. Baker Iii
George H Baker
The Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack has provided a compelling case for protecting civilian infrastructure against the effects of EMP and geomagnetic disturbances (GMD) caused by severe solar storms. Similar to protecting critical infrastructure against any hazard, it will be important to take a risk-based priority approach for these two electromagnetic threats, recognizing that it will be fiscally impracticable to protect everything. In this regard, EMP and GMD are particularly challenging in that they interfere with electrical and electronic data, control, transmission, and communication systems organic to nearly all critical infrastructures, simultaneously, …
Risky Removal: Developing A Holistic Understanding Of The Risks Of Redeveloping Sites Contaminated With Unexploded Ordnance, Matthew Bates, Elizabeth Jones, Jeffrey Keisler, Igor Linkov
Risky Removal: Developing A Holistic Understanding Of The Risks Of Redeveloping Sites Contaminated With Unexploded Ordnance, Matthew Bates, Elizabeth Jones, Jeffrey Keisler, Igor Linkov
Jeffrey Keisler
No abstract provided.
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Scenario Analysis: A Review Of Methods And Applications For Engineering And Environmental Systems, Yousra Tourki, Jeffrey Keisler, Igor Linkov
Scenario Analysis: A Review Of Methods And Applications For Engineering And Environmental Systems, Yousra Tourki, Jeffrey Keisler, Igor Linkov
Jeffrey Keisler
Changing environment, uncertain economic conditions, and socio-political unrest have renewed interest in scenario analysis, both from theoretical and applied points of view. Nevertheless, neither the processes for scenario analysis (SA) nor evaluation criteria and metrics have been regularized. In this paper, SA-reported applications and implementation methodology are discussed in the context of an extensive literature review covering papers published between 2000 and 2010. Over 340 papers were identified through a series of queries in the web of science database. The papers were classified based on the North American Industrial Classification System and SA application goals (environmental, business, and social). SA …
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Maurice Dawson
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …
Transaction Costs Analysis Of Low-Carbon Technologies, Luis Mundaca T., Mathilde Mansoz, Lena Neij, Govinda R. Timilsina
Transaction Costs Analysis Of Low-Carbon Technologies, Luis Mundaca T., Mathilde Mansoz, Lena Neij, Govinda R. Timilsina
Luis Mundaca
Transaction costs (TCs) must be taken into account when assessing the performance of policy instruments that create markets for the diffusion and commercialization of low-carbon technologies (LCTs). However, there are no comprehensive studies on the development and application of transaction cost analysis to LCTs. In this meta-analysis, a wide-ranging evaluation of TCs associated with energy efficiency, renewable energy, and carbon market technologies is provided. There is a plethora of different definitions of, and measurement techniques to estimate, TCs. There is wide variation in the quantitative estimates, which can be attributed to factors such as the definition used, data collection, quantification …
Levees And The National Flood Insurance Program: Improving Policies And Practices
Levees And The National Flood Insurance Program: Improving Policies And Practices
Earthea Nance, PhD (Stanford University, 2004)