Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber conflict (3)
- Cybersecurity (3)
- Futures (3)
- National security (3)
- Cyber rule making (2)
-
- Genocide (2)
- United Nations (2)
- Armenia (1)
- Atrocity prevention (1)
- Cambodia (1)
- Cyber Defense (1)
- Cyber Security (1)
- Cybered Conflict (1)
- Duty to prevent (1)
- Economics (1)
- Freedom of Information Act (1)
- Genocide Convention (1)
- History (1)
- Holocaust (1)
- Information (1)
- International law (1)
- Memory (1)
- Naming and shaming (1)
- Prevention (1)
- RMA (1)
- Result-orientated approach (1)
- Retroactivity (1)
- Rwanda (1)
- Rwanda Genocide (1)
- Transparency (1)
Articles 1 - 13 of 13
Full-Text Articles in Social and Behavioral Sciences
Introduction To Mca Issue, “Systemic Cyber Defense", Chris C. Demchak
Introduction To Mca Issue, “Systemic Cyber Defense", Chris C. Demchak
Military Cyber Affairs
No abstract provided.
New Documents Shed Light: Why Did Peacekeepers Withdraw During Rwanda’S 1994 Genocide?, Emily A. Willard
New Documents Shed Light: Why Did Peacekeepers Withdraw During Rwanda’S 1994 Genocide?, Emily A. Willard
Genocide Studies and Prevention: An International Journal
Why did the international community decide to withdraw United Nations peacekeeping troops from Rwanda during the 1994 genocide? Analysis of newly released documents and results from an international conference with former U.N. and government officials sheds further light on our understanding of what took place leading up to and during the Rwandan genocide. This article focuses on two key moments: 1) the United States’ reluctance to support the peacekeeping mission from before its mandate began and prior to the killing of U.S. troops in Somalia in autumn 1993; and the United States’ central role pushing the United Nations Security Council …
The Duty To Prevent Genocide Under International Law: Naming And Shaming As A Measure Of Prevention, Björn Schiffbauer
The Duty To Prevent Genocide Under International Law: Naming And Shaming As A Measure Of Prevention, Björn Schiffbauer
Genocide Studies and Prevention: An International Journal
In contrast to prosecuting and punishing committed acts of genocide, the Genocide Convention is silent as to means of preventing future acts. Today it is generally accepted that the duty to prevent is legally binding, but there is still uncertainty in international law about its specific content. This article seeks to fill this gap in the light of the object and purpose of the Genocide Convention. It provides a minimum requirement approach, i.e. indispensable State actions to comply with their duty to prevent: naming and shaming situations of genocide as what they are. Even situations from times before the Genocide …
China’S Maxim – Leave No Access Point Unexploited: The Hidden Story Of China Telecom’S Bgp Hijacking, Chris C. Demchak, Yuval Shavitt
China’S Maxim – Leave No Access Point Unexploited: The Hidden Story Of China Telecom’S Bgp Hijacking, Chris C. Demchak, Yuval Shavitt
Military Cyber Affairs
No abstract provided.
Book Review: Genocide: A World History, Renato S. Bahia
Book Review: Genocide: A World History, Renato S. Bahia
Genocide Studies and Prevention: An International Journal
No abstract provided.
Book Review: To Kill A People: Genocide In The Twentieth Century, Caroline Bennett
Book Review: To Kill A People: Genocide In The Twentieth Century, Caroline Bennett
Genocide Studies and Prevention: An International Journal
No abstract provided.
Three Futures For A Post-Western Cybered World, Chris C. Demchak
Three Futures For A Post-Western Cybered World, Chris C. Demchak
Military Cyber Affairs
West faces a different security dilemma due to the shoddy cyberspace substrate it built and spread globally. Cyberspace created a new form of ‘cybered conflict’ with five advantages for offense previously – scale of organization, proximity, precision, deception and tools, and opaqueness in origins. It also accelerated massive wealth transfers to rising near peer and now peer adversaries, who were expected to simply fold into the western-built international system. In the process, the basic well-being of the economies of the consolidated civil society democracies have become non-kinetic fields of conflict among state and nonstate actors. The past twenty-five years of …
An Economics Primer For Cyber Security Analysts, John T. Harvey
An Economics Primer For Cyber Security Analysts, John T. Harvey
Military Cyber Affairs
One of the ingredients necessary to an understanding of the impact of cyber attacks is a reliable model of the economy. We face great challenges in trying to protect an already potentially unstable system from cyber aggression and operating with a flawed understanding of the determinants of output, employment, asset prices, et cetera, surely condemns us to failure. This is so not only because we need to know where points of leverage might exist for bad actors to disrupt and disable our system, but because policy recommendations may face significant push back from both selected scholars and powerful vested interests. …
Sticking To Their Guns: The Missing Rma For Cybersecurity, Lior Tabansky
Sticking To Their Guns: The Missing Rma For Cybersecurity, Lior Tabansky
Military Cyber Affairs
Why has cybered conflict disrupted the security of the most developed nations? A foreign adversary contemplating an attack on a developed nation's heartland certainly faces multiple state-run military-grade lines of defense on land, sea and air. A foreign adversary launching a direct cyber-attack on a non-military homeland target will meet none. Armed forces do not shield a society from cyber-attacks originated by foreign adversaries, no longer provide a buffer between the enemy and homeland, nor can they identify the attacker after an attack occurred.
Adversaries succeed in waging cybered conflict against the U.S. and its allies. Having repeatedly inflicted economic …
Cyber Futures And The Justice Motive: Avoiding Pyrrhic Victory, Mark Raymond
Cyber Futures And The Justice Motive: Avoiding Pyrrhic Victory, Mark Raymond
Military Cyber Affairs
Evaluating, and choosing between, possible cyber futures requires making collective decisions about values. Tradeoffs exist in the design of any governance arrangement for information and communications technologies (ICTs). At minimum, policymakers will be required to choose between governance arrangements that optimize for speed and scale on the one hand, and those that optimize for diversity and decentralization on the other. As in any other political domain, every eventual outcome will create winners and losers, at least in relative terms. Actors dissatisfied with outcomes may perceive a discrepancy between entitlements and benefits. In some such cases, they will act on this …
Introduction To Mca Issue, “Cyber, Economics, And National Security”, Chris C. Demchak
Introduction To Mca Issue, “Cyber, Economics, And National Security”, Chris C. Demchak
Military Cyber Affairs
No abstract provided.
Book Review: Constructing Genocide And Mass Violence: Society, Crisis, Identity, Carola Lingaas
Book Review: Constructing Genocide And Mass Violence: Society, Crisis, Identity, Carola Lingaas
Genocide Studies and Prevention: An International Journal
No abstract provided.
Why The United Nations Underperforms At Preventing Mass Atrocities, Edward C. Luck
Why The United Nations Underperforms At Preventing Mass Atrocities, Edward C. Luck
Genocide Studies and Prevention: An International Journal
No abstract provided.