Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Russia (2)
- Artificial Intelligence (1)
- Atrocity Prevention (1)
- Biomanufacturing (1)
- Cell Therapy (1)
-
- Chinese Commercial Enablers (1)
- Collegiate education (1)
- Complementarity (1)
- Courts (1)
- Cyber Intelligence (1)
- Cyberattacks (1)
- Cybersecurity (1)
- Decentralization of powers (1)
- Digital Technology (1)
- Digital Twins (1)
- Education (1)
- Ethical hacking (1)
- Ethics (1)
- Fault Detection (1)
- Federalism (1)
- Federalization of the police (1)
- Genocide (1)
- Georgia (1)
- Hacking (1)
- Hinterland Securities (1)
- History politics (1)
- Information Operations (1)
- Instruction (1)
- International Criminal Court (ICC) (1)
- Internet Access (1)
Articles 1 - 8 of 8
Full-Text Articles in Law
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Genocide Studies and Prevention: An International Journal
Emerging digital technologies have changed some of the ways that genocides are planned and executed. This paper examines those differences, calling attention to how changes in the execution of genocide should prompt a shift in the approaches to atrocity prevention. It develops a conceptual framework addressing how atrocity prevention efforts might adapt to new technology within three realms of potential prevention efforts: the ethical (norms), the legal (laws), and the digital (code).
Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese
Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese
Genocide Studies and Prevention: An International Journal
In August 2008, just days after belligerent parties had reached a ceasefire agreement, the Office of the Prosecutor (OTP) announced the opening of a preliminary examination into the situation of Georgia. Yet, it was only in March 2022 that International Criminal Court (ICC) Chief Prosecutor Karim Khan applied for arrest warrants in relation to three individuals from Georgia’s breakaway region of South Ossetia. That said, how can such prolonged inaction be accounted for? How much blame does the OTP carry for it? And how did ICC-state relations develop over time? This paper conducts a within-case analysis of the situation of …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt
“Genocide Of The Soviet People”: Putin’S Russia Waging Lawfare By Means Of History, 2018–2023, Anton Weiss-Wendt
Genocide Studies and Prevention: An International Journal
This article exposes the political underpinnings of the term “genocide of the Soviet people,” introduced and actively promoted in Russia since 2019. By reclassifying mass crimes committed by the Nazis and their accomplices against the civilian population—specifically Slavic—as genocide, Russian courts effectively engage in adjudication of the history of the Second World War. In the process, genocide trials, ongoing in twenty-five Russian provinces and five occupied Ukrainian territories, present no new evidence or issue new indictments, thus fulfilling none of the objectives of a standard criminal investigation. The wording of the verdicts, and a comprehensive political project put in place …
Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu
Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu
Journal of African Conflicts and Peace Studies
The structure of the Nigerian police has overtime depicted a centralized composition that negate principles of power sharing in a federal system of government. The complexities and diverse nature of policing in Nigeria remains the bane to effective and virile administration and management of the organization. The office of the Commissioner of Police vis-à-vis those of State Governors spell contradictions in power configuration from both the Constitution and the Police Act. The enactment of vigilante services and neighbourhood watches by state governments are indicative of a failing security system especially at the component units of the Nigerian federation. The hinterlands …