Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 20 of 20
Full-Text Articles in Social and Behavioral Sciences
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Book Review: Armies In Retreat: Chaos, Cohesion, And Consequences, J.P. Clark
Book Review: Armies In Retreat: Chaos, Cohesion, And Consequences, J.P. Clark
Parameters Bookshelf – Online Book Reviews
Editors: Timothy G. Heck and Walker D. Mills
Reviewed by Dr. J.P. Clark, associate professor of strategy, Basic Strategic Art Program, US Army War College
Dr. J.P. Clark provides a thoughtful analysis of this anthology on retreat, an "under-studied topic in the US military." The book covers case studies spanning from the ancient world to the US withdrawal from Afghanistan in 2021 and even discusses retreat in the context of cyberspace. Clark employs his expertise as a strategy professor to give a valuable critique, highlighting the book’s merits (for example, the “intriguing angle” of the Gallipoli Campaign analysis) and some …
Book Review: Cyber Intelligence: Actors, Policies, And Practices, Robert J. Bunker
Book Review: Cyber Intelligence: Actors, Policies, And Practices, Robert J. Bunker
Parameters Bookshelf – Online Book Reviews
Author: Constance S. Uthoff
Reviewed by Dr. Robert J. Bunker, director of research and analysis, managing partner, C/O Futures LLC
From intelligence cycles and processes to intelligence agencies, security challenges, and more, Cyber Intelligence: Actors, Policies, and Practices is a solid work that “covers a lot of ground at a reasonable price.” The reviewer sees it as “a practical tool in our understanding of the cyber intelligence and conflict discipline.”
Rethinking Boundaries, Spaces, And Networks Between Geography And Military Science: Understanding And Actualizing Real-Time Integrated Command And Control For Joint Air Operations, Samuel Wright
Honors Theses
Imagine a military commander standing around a table with a three-dimensional hologram projected onto to it. The hologram is of an ongoing air war of which this general is in command. Friendly forces are portrayed in blue and enemy forces in red as the opposing forces movements and actions are tracked and continuously updated. The commander has god’s eye view of where his forces are positioned relative to the enemy’s forces. Because of this view, the commander is able to make effective decisions with quick synergistic efficiency to achieve his desired outcome: defeat of the enemy. This scene invokes an …
Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana
Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana
Walden Dissertations and Doctoral Studies
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential terrorist threats to preempt and mitigate the attacks. Data collection included document content analysis of the …
An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah Van Rossum
An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah Van Rossum
MSU Graduate Theses
This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by denying and …
Will War's Nature Change In The Seventh Military Revolution?, F. G. Hoffman
Will War's Nature Change In The Seventh Military Revolution?, F. G. Hoffman
The US Army War College Quarterly: Parameters
This article examines the potential implications of the combinations of robotics, artificial intelligence, and deep learning systems on the character and nature of war. The author employs Carl von Clausewitz’s trinity concept to discuss how autonomous weapons will impact the essential elements of war. The essay argues war’s essence, as politically directed violence fraught with friction, will remain its most enduring aspect, even if more intelligent machines are involved at every level.
A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott
A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott
Penn State Journal of Law & International Affairs
No abstract provided.
The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown
The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown
Penn State Journal of Law & International Affairs
No abstract provided.
Challenges Of Implementing Defense Policies To Deter Hostile Actors In Space And Cyberspace, Stephan Dwayne Bjerring Powers
Challenges Of Implementing Defense Policies To Deter Hostile Actors In Space And Cyberspace, Stephan Dwayne Bjerring Powers
MSU Graduate Theses
Space and cyber operations have changed national security for both nations and non-state actors worldwide. The low barriers to entry have allowed less sophisticated nations and actors to have an impact on the U.S. and near-peer nations. The lack of attribution and the ability to obfuscate the source of the space or cyber weapon will make the case for wartime retaliation difficult. The highly proactive antisatellite weapons test conducted by China in 2007 and the alleged employment of Stuxnet against Iran's nuclear program by the United States and Israel illustrates the potentially destabilizing effects to high priority national programs. If …
Hacking Back: Not The Right Solution, Emilio Iasiello
Hacking Back: Not The Right Solution, Emilio Iasiello
The US Army War College Quarterly: Parameters
No abstract provided.
Cyberspace: Malevolent Actors, Criminal Opportunities, And Strategic Competition Conference, Robert J. Bunker
Cyberspace: Malevolent Actors, Criminal Opportunities, And Strategic Competition Conference, Robert J. Bunker
CGU Faculty Publications and Research
No abstract provided.
The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert
The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert
Penn State Journal of Law & International Affairs
Cyberspace – the global environment of digital communications – surrounds and embodies us entirely, 24 hours a day, 7 days a week. We are always on, always connected: emailing, texting, searching, networking, and sharing are all now as commonplace as eating, breathing, and sleeping. But there is a dark side to cyberspace - hidden contests and malicious threats - that is growing like a disease from the inside-out. This disease has many symptoms, and is being reinforced by a multiplicity of disparate but mutually reinforcing causes. Some of these driving forces are unintended byproducts of the new digital universe into …
The Growing Mexican Cartel And Vigilante War In Cyberspace: Information Offensives And Counter-Offensives, Robert J. Bunker
The Growing Mexican Cartel And Vigilante War In Cyberspace: Information Offensives And Counter-Offensives, Robert J. Bunker
CGU Faculty Publications and Research
This short essay blends traditional Mexican cartel analysis indicative of earlier Small Wars Journal writings by this author with advanced (5th dimensional) warfighting concepts. These concepts have utility for engagement with non-state (new warmaking) entities. They are being increasingly discussed now that cyberspace and ‘dual dimensional’ operations are more frequently breaking out in the Mexican conflict.
Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*]
Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*]
Faculty Publications
This article endorses the idea that cyber operations may be conducted in all war-fighting domains: air, space, cyberspace, land, and sea. In addition, despite the immaturity of cyberspace operational doctrines, the doctrines from air and space remain relevant and applicable to the cyberspace domain. Cyber operations are just another set of tools in the commander's toolbox. Although cyber operations have distinct ways of achieving effects, from an Air Force perspective they are similar too the air and space operations that support air and space (and cyberspace) functions. Known and established cyber operations provide war fighters with viable options to kinetic …
Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil
Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil
Graduate Program in International Studies Theses & Dissertations
One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation.
The analytical approach diverges from past utilitarian-based assessments to …
The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman
The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman
All Faculty Scholarship
The treatment of customary practices has been widely debated in many areas of the law, but there has been virtually no discussion of how custom is and should be treated in the context of intellectual property (IP). Nevertheless, customs have a profound impact on both de facto and de jure IP law. The unarticulated incorporation of custom threatens to swallow up IP law, and replace it with industry-led IP regimes that give the public and other creators more limited rights to access and use intellectual property than were envisioned by the Constitution and Congress. This article presents a powerful critique …
Book Review: Quantum Jump: A Survival Guide For The New Renaissance, Robert J. Bunker
Book Review: Quantum Jump: A Survival Guide For The New Renaissance, Robert J. Bunker
CGU Faculty Publications and Research
No abstract provided.
Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts And Technologies?, Robert J. Bunker
Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts And Technologies?, Robert J. Bunker
CGU Faculty Publications and Research
No abstract provided.
Book Review: Neuromancer, Robert J. Bunker
Book Review: Neuromancer, Robert J. Bunker
CGU Faculty Publications and Research
No abstract provided.