Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Social and Behavioral Sciences

Book Reviews, Usawc Press Aug 2024

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Book Review: Armies In Retreat: Chaos, Cohesion, And Consequences, J.P. Clark May 2024

Book Review: Armies In Retreat: Chaos, Cohesion, And Consequences, J.P. Clark

Parameters Bookshelf – Online Book Reviews

Editors: Timothy G. Heck and Walker D. Mills

Reviewed by Dr. J.P. Clark, associate professor of strategy, Basic Strategic Art Program, US Army War College

Dr. J.P. Clark provides a thoughtful analysis of this anthology on retreat, an "under-studied topic in the US military." The book covers case studies spanning from the ancient world to the US withdrawal from Afghanistan in 2021 and even discusses retreat in the context of cyberspace. Clark employs his expertise as a strategy professor to give a valuable critique, highlighting the book’s merits (for example, the “intriguing angle” of the Gallipoli Campaign analysis) and some …


Book Review: Cyber Intelligence: Actors, Policies, And Practices, Robert J. Bunker Aug 2023

Book Review: Cyber Intelligence: Actors, Policies, And Practices, Robert J. Bunker

Parameters Bookshelf – Online Book Reviews

Author: Constance S. Uthoff

Reviewed by Dr. Robert J. Bunker, director of research and analysis, managing partner, C/O Futures LLC

From intelligence cycles and processes to intelligence agencies, security challenges, and more, Cyber Intelligence: Actors, Policies, and Practices is a solid work that “covers a lot of ground at a reasonable price.” The reviewer sees it as “a practical tool in our understanding of the cyber intelligence and conflict discipline.”


Rethinking Boundaries, Spaces, And Networks Between Geography And Military Science: Understanding And Actualizing Real-Time Integrated Command And Control For Joint Air Operations, Samuel Wright May 2020

Rethinking Boundaries, Spaces, And Networks Between Geography And Military Science: Understanding And Actualizing Real-Time Integrated Command And Control For Joint Air Operations, Samuel Wright

Honors Theses

Imagine a military commander standing around a table with a three-dimensional hologram projected onto to it. The hologram is of an ongoing air war of which this general is in command. Friendly forces are portrayed in blue and enemy forces in red as the opposing forces movements and actions are tracked and continuously updated. The commander has god’s eye view of where his forces are positioned relative to the enemy’s forces. Because of this view, the commander is able to make effective decisions with quick synergistic efficiency to achieve his desired outcome: defeat of the enemy. This scene invokes an …


Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana Jan 2018

Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana

Walden Dissertations and Doctoral Studies

Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential terrorist threats to preempt and mitigate the attacks. Data collection included document content analysis of the …


An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah Van Rossum Dec 2017

An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah Van Rossum

MSU Graduate Theses

This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by denying and …


Will War's Nature Change In The Seventh Military Revolution?, F. G. Hoffman Nov 2017

Will War's Nature Change In The Seventh Military Revolution?, F. G. Hoffman

The US Army War College Quarterly: Parameters

This article examines the potential implications of the combinations of robotics, artificial intelligence, and deep learning systems on the character and nature of war. The author employs Carl von Clausewitz’s trinity concept to discuss how autonomous weapons will impact the essential elements of war. The essay argues war’s essence, as politically directed violence fraught with friction, will remain its most enduring aspect, even if more intelligent machines are involved at every level.


A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott Apr 2017

A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott

Penn State Journal of Law & International Affairs

No abstract provided.


The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown Apr 2017

The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown

Penn State Journal of Law & International Affairs

No abstract provided.


Challenges Of Implementing Defense Policies To Deter Hostile Actors In Space And Cyberspace, Stephan Dwayne Bjerring Powers May 2016

Challenges Of Implementing Defense Policies To Deter Hostile Actors In Space And Cyberspace, Stephan Dwayne Bjerring Powers

MSU Graduate Theses

Space and cyber operations have changed national security for both nations and non-state actors worldwide. The low barriers to entry have allowed less sophisticated nations and actors to have an impact on the U.S. and near-peer nations. The lack of attribution and the ability to obfuscate the source of the space or cyber weapon will make the case for wartime retaliation difficult. The highly proactive antisatellite weapons test conducted by China in 2007 and the alleged employment of Stuxnet against Iran's nuclear program by the United States and Israel illustrates the potentially destabilizing effects to high priority national programs. If …


Hacking Back: Not The Right Solution, Emilio Iasiello Sep 2014

Hacking Back: Not The Right Solution, Emilio Iasiello

The US Army War College Quarterly: Parameters

No abstract provided.


Cyberspace: Malevolent Actors, Criminal Opportunities, And Strategic Competition Conference, Robert J. Bunker Jan 2013

Cyberspace: Malevolent Actors, Criminal Opportunities, And Strategic Competition Conference, Robert J. Bunker

CGU Faculty Publications and Research

No abstract provided.


The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert Nov 2012

The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert

Penn State Journal of Law & International Affairs

Cyberspace – the global environment of digital communications – surrounds and embodies us entirely, 24 hours a day, 7 days a week. We are always on, always connected: emailing, texting, searching, networking, and sharing are all now as commonplace as eating, breathing, and sleeping. But there is a dark side to cyberspace - hidden contests and malicious threats - that is growing like a disease from the inside-out. This disease has many symptoms, and is being reinforced by a multiplicity of disparate but mutually reinforcing causes. Some of these driving forces are unintended byproducts of the new digital universe into …


The Growing Mexican Cartel And Vigilante War In Cyberspace: Information Offensives And Counter-Offensives, Robert J. Bunker Jan 2011

The Growing Mexican Cartel And Vigilante War In Cyberspace: Information Offensives And Counter-Offensives, Robert J. Bunker

CGU Faculty Publications and Research

This short essay blends traditional Mexican cartel analysis indicative of earlier Small Wars Journal writings by this author with advanced (5th dimensional) warfighting concepts. These concepts have utility for engagement with non-state (new warmaking) entities. They are being increasingly discussed now that cyberspace and ‘dual dimensional’ operations are more frequently breaking out in the Mexican conflict.


Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*] Apr 2010

Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*]

Faculty Publications

This article endorses the idea that cyber operations may be conducted in all war-fighting domains: air, space, cyberspace, land, and sea. In addition, despite the immaturity of cyberspace operational doctrines, the doctrines from air and space remain relevant and applicable to the cyberspace domain. Cyber operations are just another set of tools in the commander's toolbox. Although cyber operations have distinct ways of achieving effects, from an Air Force perspective they are similar too the air and space operations that support air and space (and cyberspace) functions. Known and established cyber operations provide war fighters with viable options to kinetic …


Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil Apr 2010

Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil

Graduate Program in International Studies Theses & Dissertations

One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation.

The analytical approach diverges from past utilitarian-based assessments to …


The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman Dec 2007

The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman

All Faculty Scholarship

The treatment of customary practices has been widely debated in many areas of the law, but there has been virtually no discussion of how custom is and should be treated in the context of intellectual property (IP). Nevertheless, customs have a profound impact on both de facto and de jure IP law. The unarticulated incorporation of custom threatens to swallow up IP law, and replace it with industry-led IP regimes that give the public and other creators more limited rights to access and use intellectual property than were envisioned by the Constitution and Congress. This article presents a powerful critique …


Book Review: Quantum Jump: A Survival Guide For The New Renaissance, Robert J. Bunker Jan 2000

Book Review: Quantum Jump: A Survival Guide For The New Renaissance, Robert J. Bunker

CGU Faculty Publications and Research

No abstract provided.


Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts And Technologies?, Robert J. Bunker Jan 1998

Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts And Technologies?, Robert J. Bunker

CGU Faculty Publications and Research

No abstract provided.


Book Review: Neuromancer, Robert J. Bunker Jan 1996

Book Review: Neuromancer, Robert J. Bunker

CGU Faculty Publications and Research

No abstract provided.