Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber Operations (3)
- Cyber defense (3)
- Nukes (3)
- Austerity (2)
- Cyber (2)
-
- Cyber operations (2)
- Deterrence (2)
- Nuclear (2)
- Security Studies (2)
- Sequestration (2)
- 2nd term (1)
- AI (1)
- Android (1)
- Armed forces (1)
- Budget (1)
- Community Resiliency (1)
- Complexity (1)
- Computer law (1)
- Counter cyber (1)
- Crime Prevention; Theft; Property Marking; Theft‐chain‐cycle; Supply Chain; Burglary; Drugs (1)
- Criminology, security science (1)
- Critical Infrastructure Assurance (1)
- Critical Infrastructure Protection (1)
- Cubic transformation (1)
- Cyber Deterrence (1)
- Cyber Operations in Space (1)
- Cyber Security (1)
- Cyber defense workforce (1)
- Cyber deterrence (1)
- Cyber security (1)
- Publication
Articles 1 - 16 of 16
Full-Text Articles in Engineering
National Infrastructure Protection Priorities For Nuclear Electromagnetic Pulse (Emp) And Solar Storm Geomagnetic Disturbance Catastrophes, George H. Baker Iii
National Infrastructure Protection Priorities For Nuclear Electromagnetic Pulse (Emp) And Solar Storm Geomagnetic Disturbance Catastrophes, George H. Baker Iii
George H Baker
The Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack has provided a compelling case for protecting civilian infrastructure against the effects of EMP and geomagnetic disturbances (GMD) caused by severe solar storms. Similar to protecting critical infrastructure against any hazard, it will be important to take a risk-based priority approach for these two electromagnetic threats, recognizing that it will be fiscally impracticable to protect everything. In this regard, EMP and GMD are particularly challenging in that they interfere with electrical and electronic data, control, transmission, and communication systems organic to nearly all critical infrastructures, simultaneously, …
Special Section Editorial: Risk, Complexity And Sustainability, Lindsay Robertson, Katina Michael
Special Section Editorial: Risk, Complexity And Sustainability, Lindsay Robertson, Katina Michael
Professor Katina Michael
This special section is dedicated to risk as understood within our society, in which we depend upon increasingly complex and interconnected technologies for even our most basic needs - water, food, shelter, electricity, gas, sewage, communications, and banking.
Natural disasters and their impact on vital services has been a research area that has flourished, especially since the 2004 Indian Ocean Tsunami that claimed hundreds of thousands of lives in South Asia. Out of this research has come forth a plethora of strategies for addressing short term and geographically defined disasters. While such disaster preparedness systems are vital to minimise the …
Extremes Of Nonlinear Vibration: Comparing Models Based On Moments, L-Moments, And Maximum Entropy, Steven R. Winterstein, Cameron A. Mackenzie
Extremes Of Nonlinear Vibration: Comparing Models Based On Moments, L-Moments, And Maximum Entropy, Steven R. Winterstein, Cameron A. Mackenzie
Cameron A. MacKenzie
Wind and wave loads on offshore structures show nonlinear effects, which require nonGaussian statistical models. Here we critically review the behavior of various nonGaussian models. We first survey moment-based models; in particular, the four-moment “Hermite” model, a cubic transformation often used in wind and wave applications. We then derive an “L-Hermite” model, an alternative cubic transformation calibrated by the response “L-moments” rather than its ordinary statistical moments. These L-moments have recently found increasing use, in part because they show less sensitivity to distribution tails than ordinary moments. We find here, however, that these L-moments may not convey sufficient information to …
Risky Removal: Developing A Holistic Understanding Of The Risks Of Redeveloping Sites Contaminated With Unexploded Ordnance, Matthew Bates, Elizabeth Jones, Jeffrey Keisler, Igor Linkov
Risky Removal: Developing A Holistic Understanding Of The Risks Of Redeveloping Sites Contaminated With Unexploded Ordnance, Matthew Bates, Elizabeth Jones, Jeffrey Keisler, Igor Linkov
Jeffrey Keisler
No abstract provided.
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Scenario Analysis: A Review Of Methods And Applications For Engineering And Environmental Systems, Yousra Tourki, Jeffrey Keisler, Igor Linkov
Scenario Analysis: A Review Of Methods And Applications For Engineering And Environmental Systems, Yousra Tourki, Jeffrey Keisler, Igor Linkov
Jeffrey Keisler
Changing environment, uncertain economic conditions, and socio-political unrest have renewed interest in scenario analysis, both from theoretical and applied points of view. Nevertheless, neither the processes for scenario analysis (SA) nor evaluation criteria and metrics have been regularized. In this paper, SA-reported applications and implementation methodology are discussed in the context of an extensive literature review covering papers published between 2000 and 2010. Over 340 papers were identified through a series of queries in the web of science database. The papers were classified based on the North American Industrial Classification System and SA application goals (environmental, business, and social). SA …
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez
Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez
Emmanouil Alexander Zografakis EZ
Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
The Application Of Traditional Tort Theory To Embodied Machine Intelligence, Curtis E.A. Karnow
The Application Of Traditional Tort Theory To Embodied Machine Intelligence, Curtis E.A. Karnow
Curtis E.A. Karnow
This note discusses the traditional tort theories of liability such as negligence and strict liability and suggests these are likely insufficient to impose liability on legal entities (people and companies) selling or employing autonomous robots. I provide the essential working definitions of ‘autonomous’ as well as the legal notion of ‘foreseeability’ which lies at the heart of tort liability. The note is not concerned with the policy, ethics, or other issues arising from the use of robots including armed and unarmed drones, because those, as I define them, are not currently autonomous, and do not implicate the legal issues I …
Breaking The Theft-Chain-Cycle: Property Marking As A Defensive Tool, William J. Bailey, David J. Brooks
Breaking The Theft-Chain-Cycle: Property Marking As A Defensive Tool, William J. Bailey, David J. Brooks
Bill Bailey
The theft of property and its associated impact effects many parts of society. For example, a considerable amount of resources are expended in trying to reduce property theft, as such crime engenders both a financial and emotional impact (Grabosky, 1995, p. 1) on those involved. Factors such as fear of crime, increased insurance premiums and victimization are all outcomes of property crime. Much of the past research has focused on the mitigation of such crimes, collectively termed as ‘crime prevention’. Crime prevention are “any actions designed to reduce the actual level of crime and/or the perceived crime” (S.P. Lab, 2010, …
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Maurice Dawson
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …
Transaction Costs Analysis Of Low-Carbon Technologies, Luis Mundaca T., Mathilde Mansoz, Lena Neij, Govinda R. Timilsina
Transaction Costs Analysis Of Low-Carbon Technologies, Luis Mundaca T., Mathilde Mansoz, Lena Neij, Govinda R. Timilsina
Luis Mundaca
Transaction costs (TCs) must be taken into account when assessing the performance of policy instruments that create markets for the diffusion and commercialization of low-carbon technologies (LCTs). However, there are no comprehensive studies on the development and application of transaction cost analysis to LCTs. In this meta-analysis, a wide-ranging evaluation of TCs associated with energy efficiency, renewable energy, and carbon market technologies is provided. There is a plethora of different definitions of, and measurement techniques to estimate, TCs. There is wide variation in the quantitative estimates, which can be attributed to factors such as the definition used, data collection, quantification …
Levees And The National Flood Insurance Program: Improving Policies And Practices
Levees And The National Flood Insurance Program: Improving Policies And Practices
Earthea Nance, PhD (Stanford University, 2004)