Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Political Science (26)
- International Relations (18)
- Public Affairs, Public Policy and Public Administration (15)
- Computer Sciences (11)
- Physical Sciences and Mathematics (11)
-
- Defense and Security Studies (10)
- Law (10)
- Arts and Humanities (9)
- Engineering (9)
- Business (8)
- Public Policy (8)
- Military and Veterans Studies (6)
- Military, War, and Peace (6)
- Other Political Science (6)
- Peace and Conflict Studies (6)
- Policy Design, Analysis, and Evaluation (6)
- Political Theory (6)
- Psychology (6)
- Public Affairs (6)
- Databases and Information Systems (5)
- Management Information Systems (5)
- National Security Law (5)
- Organizational Behavior and Theory (5)
- Other Computer Sciences (5)
- Risk Analysis (5)
- Computer Law (4)
- Criminology (4)
- Information Security (4)
- International and Area Studies (4)
- Institution
-
- Selected Works (9)
- University of South Florida (4)
- Liberty University (2)
- Penn State Law (2)
- SelectedWorks (2)
-
- US Army War College (2)
- University of Texas Rio Grande Valley (2)
- University of Wollongong (2)
- Bard College (1)
- Bellarmine University (1)
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Oberlin (1)
- St. John's University (1)
- The University of Maine (1)
- The University of Southern Mississippi (1)
- Universitas Indonesia (1)
- Universitas Negeri Yogyakarta (1)
- University of Central Florida (1)
- University of Kentucky (1)
- University of Nebraska - Lincoln (1)
- Utah State University (1)
- Virginia Commonwealth University (1)
- Western Kentucky University (1)
- Western University (1)
- Publication Year
- Publication
-
- Jan Kallberg (7)
- Military Cyber Affairs (4)
- Faculty of Arts - Papers (Archive) (2)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (2)
- Penn State Journal of Law & International Affairs (2)
-
- Psychological Science Faculty Publications and Presentations (2)
- All Graduate Theses and Dissertations, Fall 2023 to Present (1)
- Allen Gnanam (1)
- Articles & Editorials (1)
- CMC Senior Theses (1)
- Capstones (1)
- Charles M Hawksley (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Emilio Iasiello (1)
- FIU Electronic Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Capstones (1)
- Honors Papers (1)
- Honors Theses (1)
- Honors Undergraduate Theses (1)
- Informasi (1)
- Information Science Faculty Publications (1)
- International Bulletin of Political Psychology (1)
- Journal of Strategic and Global Studies (1)
- L. Douglas Wilder School of Government and Public Affairs Publications (1)
- Master's Theses (1)
- Masters Theses & Specialist Projects (1)
- Professor Katina Michael (1)
- Senior Projects Spring 2014 (1)
- The US Army War College Quarterly: Parameters (1)
- Publication Type
Articles 1 - 30 of 44
Full-Text Articles in Social and Behavioral Sciences
Public Cyberattack Attribution And Domestic Political Considerations: An Analysis Of State Decision Making, Ella M. Devey
Public Cyberattack Attribution And Domestic Political Considerations: An Analysis Of State Decision Making, Ella M. Devey
All Graduate Theses and Dissertations, Fall 2023 to Present
When a country is targeted with a cyberattack, what compels its government to publicly attribute the perpetrators of the attack rather than keep their attribution private? Cyberattacks are an increasingly utilized weapon of international conflict by governments, groups, and individuals. Following a cyberattack, the target of the attack may investigate the origin of the attack and may choose to share their findings with the public; alternatively, they may choose not to publicly share their findings.
While we know that forensic capabilities and international political factors contribute to the decision of governments to make public cyberattack attribution, domestic political circumstances may …
Nato Cyber Defence, 2000-2022, Ryan J. Atkinson
Nato Cyber Defence, 2000-2022, Ryan J. Atkinson
Electronic Thesis and Dissertation Repository
The emergence of more devastating and organized cyber attacks by non-attributable threat actors internationally raises questions about whether classical deterrence theory in its contemporary form has assisted important military defence alliances, like the North Atlantic Treaty Organization (NATO), to adapt to the changing threat landscape. The timeline of the NATO Alliance's adaptation to external cyber threats is examined at critical historical junctures. Changes and adaptation within internal policy-making processes at NATO headquarters and its affiliated centres, think tanks, and military bases are analysed with input from informed decision-makers. The research project demonstrates that NATO policy substantively changed over the period …
The Future Of The Cyber Theater Of War, Elizabeth Cook
The Future Of The Cyber Theater Of War, Elizabeth Cook
Helm's School of Government Conference - American Revival: Citizenship & Virtue
Few could imagine how it would develop when the air was the new theater of war. The literature showcases that a lack of imagination and state-level institutionalized power structures, particularly in the U.S., hampered the progress of air as a new theater of war both in thought and application. Today, a similar lack of imagination on the cyber theater of war is a great source of insecurity in the world system; it sets the stage for strategic shocks like the ones to the U.S. on December 7, 1941, and 9/11. To avoid this, states should imagine how a convergence of …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Raising The Cyber Guard: Analyzing The Cost And Use Of The National Guard In Local Municipal And State Cyber Defense, Hunter Lacroix
Raising The Cyber Guard: Analyzing The Cost And Use Of The National Guard In Local Municipal And State Cyber Defense, Hunter Lacroix
Theses and Dissertations
Cybersecurity is a national priority for the Homeland Security enterprise. Yet, despite a prioritization at the federal level, municipal and state governments have struggled to incorporate the National Guard in cyber incident response. Cyber incidents strain municipalities and states, which have spent significant resources to mitigate cyber threats. The glaring gap in the National Guard’s role in municipal and state cyber incident response warrants two key questions as to why the National Guard isn’t more readily used. “Is it cost prohibitive to use National Guard assets when compared to private entities?” Or “is there an underlying sociological disconnect regarding the …
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
U.S. Warfare Within The Fifth Domain: Deterring Russian Cyber Aggression, Dominick Namias, Jacob Chace
U.S. Warfare Within The Fifth Domain: Deterring Russian Cyber Aggression, Dominick Namias, Jacob Chace
Helm's School of Government Conference - American Revival: Citizenship & Virtue
No abstract provided.
Unique, Additive, And Interactive Effects Of Types Of Intimate Partner Cybervictimization On Depression In Hispanic Emerging Adults, Jorge I. Cantu, Ruby Charak
Unique, Additive, And Interactive Effects Of Types Of Intimate Partner Cybervictimization On Depression In Hispanic Emerging Adults, Jorge I. Cantu, Ruby Charak
Psychological Science Faculty Publications and Presentations
The advent of modern technology has inadvertently created newer avenues for intimate partner victimization (IPV) to transpire. This study investigated (a) whether psychological, sexual, and stalking intimate partner cybervictimization (cyber IPV) types were uniquely associated with depression and whether there were (b) additive and (c) interactive effects of cyber IPV types on depression, after controlling for face-to-face IPV among Hispanic emerging adults. Participants were 903 Hispanic emerging adults in the age range of 18 to 29 years (M = 20.68, SD = 2.42; 74% female) attending a public university in South Texas. Participants completed an online questionnaire assessing cyber …
An Analysis Of Cyber Wargaming: Current Games, Limitations, And Recommendations, Sarah Chen
An Analysis Of Cyber Wargaming: Current Games, Limitations, And Recommendations, Sarah Chen
CMC Senior Theses
Cyberspace operations and conflict pose a unique challenge to decision-makers due to the uncertainty and unpredictability of cyber capabilities. Relying on wargaming literature, public cyber wargame reports, and expert interviews, this thesis analyzes the utility of cyber wargaming for education and analysis. Cyber wargames offer a method of testing, exploring, and understanding cyberspace through the abstraction and representation of cyber tools and attack cycles.
The thesis begins by examining cyber conflict and theorizes hypothetical wargame use cases. It then creates a framework for cyber wargaming elements and examines the design of eleven analytical wargames, eight educational wargames, and three commercial …
Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii
Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii
Journal of Strategic and Global Studies
Current information has become a very important commodity. Some even say that our society is already in an "information-based society". The ability to access and provide information quickly and accurately is very important for an organization, such as companies, universities, government agencies, and individuals. Once the importance of the value of information causes often the desired information can only be accessed by certain people. The fall of information in the hands of other parties can cause harm to the information owner. Security issues are an important aspect of an information system management. Unfortunately, this security problem often gets less attention …
Full Spectrum Space Deterrence: From Laws To Technology, Joshua Carlson
Full Spectrum Space Deterrence: From Laws To Technology, Joshua Carlson
Honors Theses
Conflict in space is becoming an ever-real possibility, with the potential of rendering the space completely useless for future generations. Current talks are centered around limiting or preventing any weapons deployed to space, but this is not the most effective way of dealing with the issue. The focus should shift to agreeing on how nations should act responsibly in space together instead of preventing nations from acting at all. The best way of accomplishing this goal is by improving satellite design, creating agreed upon and understood rules of engagement, fostering widespread cooperation between nations, and choosing not to be the …
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
FIU Electronic Theses and Dissertations
Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.
This …
Strategic Culture And Cyber Strategy, Andrew S. Olejarski
Strategic Culture And Cyber Strategy, Andrew S. Olejarski
Honors Undergraduate Theses
The intent of this paper is to explore the relationship between strategic culture theory and how it interacts with war-parallel usage of cyber methods. Cyber methods, at times incorrectly classified as "cyberwarfare", as a means of statecraft are becoming increasingly prevalent, and developing an understanding of how states use them, particularly during conflicts, would be a great boon to the field of security studies. Strategic culture theory, an international relations theory focusing on the relationship between culture and strategy, may be an effective means to analyze conflict-parallel use of cyber methods. This paper will consider the relationship between strategic culture …
Unique And Cumulative Effects Of Intimate Partner Cybervictimization Types On Alcohol Use In Lesbian, Gay, And Bisexual Emerging Adults, Oscar Trujillo, Jorge I. Cantu, Ruby Charak
Unique And Cumulative Effects Of Intimate Partner Cybervictimization Types On Alcohol Use In Lesbian, Gay, And Bisexual Emerging Adults, Oscar Trujillo, Jorge I. Cantu, Ruby Charak
Psychological Science Faculty Publications and Presentations
The use of modern technology has inadvertently created newer platforms for intimate partner victimization to take place. The present study investigated (i) whether psychological, sexual, and stalking intimate partner cybervictimization (cyber IPV) types were uniquely associated with alcohol use, and (ii) whether there were additive effect of cyber IPV types on alcohol use, after controlling for histories of childhood maltreatment types, face-to-face intimate partner victimization among lesbian, gay, and bisexual (LGB) emerging adults. Participants were 277 self-identifying LGB individuals in the age range of 18-29 years (M = 25.39, SD = 2.77; 16.6% lesbian, 25.6% gay, 43% bisexual women). Participants …
Making The War Colleges Better, Richard A. Lacquement Jr
Making The War Colleges Better, Richard A. Lacquement Jr
The US Army War College Quarterly: Parameters
No abstract provided.
Cyberbullying And School Climate, Emily Payton Fisher
Cyberbullying And School Climate, Emily Payton Fisher
Masters Theses & Specialist Projects
The purpose of this study was to examine the relationships between demographic variables known to predict bullying and victimization, traditional bullying victimization, cyberbullying victimization, and school climate. Participants were 214 fourth and fifth grade students from three elementary schools in Warren County, Kentucky. Students answered demographic questions and completed a series of surveys including the Positive Experience Checklist and the School Climate Survey Suite. Demographic variables and traditional bullying victimization were regressed on the students’ perception of school climate (Model 1). Additionally, cyberbullying victimization was included in a second block to estimate its explanatory value (Model 2). The present study …
An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh
An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh
Electronic Theses and Dissertations
Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:
-
Discussion and Dialogue
-
Research
-
Confidence Building Measures
-
Incident Response
-
Crime …
Crossing The Digital Divide: Monism, Dualism And The Reason Collective Action Is Critical For Cyber Theory Production, Christopher Whyte
Crossing The Digital Divide: Monism, Dualism And The Reason Collective Action Is Critical For Cyber Theory Production, Christopher Whyte
L. Douglas Wilder School of Government and Public Affairs Publications
In studying topics in cyber conflict and cyber-security governance, scholars must ask—arguably more so than has been the case with any other emergent research agenda—where the epistemological and ontological value of different methods lies. This article describes the unique, dual methodological challenges inherent in the multifaceted program on global cyber-security and asks how problematic they are for scholarly efforts to construct knowledge about digital dynamics in world affairs. I argue that any answer to this question will vary depending on how one perceives the social science enterprise. While traditional dualistic perspectives on social science imply unique challenges for researcher, a …
Born To Run: A Grounded Theory Study Of Cheating In The Online Speedrunning Community, Christopher G. Brewer
Born To Run: A Grounded Theory Study Of Cheating In The Online Speedrunning Community, Christopher G. Brewer
Master's Theses
Video games represent a growing genre of media quickly becoming one of the leading forms of entertainment (Jordan, 2014). This popularity has allowed new playstyles to emerge across the video game genre, such as e-Sports and speedrunning. In particular, the speedrunning community has somewhat redefined what it means to “cheat” in a video game by accepting the use certain software and hardware violations that could be seen as “cheating” to the general gaming community. This paper examined the social construction of cheating in this digital community through the use of grounded theory methods.
Strategic Insights: Speed Kills—Enter An Age Of Unbridled Hyperconnectivity, Nathan P. Freier Mr.
Strategic Insights: Speed Kills—Enter An Age Of Unbridled Hyperconnectivity, Nathan P. Freier Mr.
Articles & Editorials
No abstract provided.
A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott
A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott
Penn State Journal of Law & International Affairs
No abstract provided.
The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown
The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown
Penn State Journal of Law & International Affairs
No abstract provided.
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
Military Cyber Affairs
China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …
Waging Wars In Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare. Could Iran Legally Retaliate For The Stuxnet Attack?, Willa Rubin
Honors Papers
The technical capabilities of the Stuxnet worms-launched by the US and Israel against Iran's nuclear facility-prove that the operation could be considered an act of aggression, as defined in the Rome Statute. Further, this paper asserts that Article 51 of the UN Charter is insufficient to addressing malignant cyber operations.
The paper is organized as following: 1) Introduction, 2) Research Limitations, 3) Context: International Relations Theory and Types of International Law, 4) Understanding “Cyber” Within The Scope Of This Paper, 5) The Stuxnet Operation, 6) Historical and Legal Roots of “Aggression” and “Self-Defense”, 7) Stuxnet as an act of aggression, …
Webcam Child Sex Abuse, Lena Masri
Webcam Child Sex Abuse, Lena Masri
Capstones
Webcam child sex is a booming global industry, a twist in pedophilia as fast growing and difficult to police, according to law enforcement officials.
Seksualitas Cyber: Sex Sebagai Kesenangan Dan Komoditas, Puji Rianto
Seksualitas Cyber: Sex Sebagai Kesenangan Dan Komoditas, Puji Rianto
Informasi
Abstract
This paper wants to explore further how sexuality is present in the cyber world. Although the construction of human sexuality age as the man himself, the construction or representation will be largely determined by the social context. Different characters from the cyber world where political authority and the gatekeeper do not contribute significantly will influence the construction of sexuality. The study found that sex is understood as a pleasure and commodities. Various reports of sexual offenders describe how the pleasure of sexual intercourse highly revered. Along with the cult of sexuality as pleasure is sex as a commodity, which …
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Jan Kallberg
Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …
Cyberbullying Prevention: Intervention Effects On Student Involvement, Sarah Nash Bumpas
Cyberbullying Prevention: Intervention Effects On Student Involvement, Sarah Nash Bumpas
Graduate Theses, Dissertations, and Capstones
Repeated studies show that cyberbullying is pervasive amongst adolescents. Cyberbullying can lead to self-harm, depression, and suicidal thoughts. Educators are called to intervene in educating students about cyberbullying through research and federal legislation. However, there is little research examining whether this education is taking place or having an effect.
This study investigates the relationship between the incidences of cyberbullying victimization and offending over time and the direct cyberbullying instruction and activities facilitated by classroom teachers. The study took place amongst sixth graders in Jefferson County Public Schools, a large urban school district located in northern Kentucky. Students in one school …
Enabling Cyber Physical Systems With Wireless Sensor Networking Technologies, Multiagent System Paradigm, And Natural Ecosystems, Nafaâ Jabeur, Nabil Sahli, Sherali Zeadally
Enabling Cyber Physical Systems With Wireless Sensor Networking Technologies, Multiagent System Paradigm, And Natural Ecosystems, Nafaâ Jabeur, Nabil Sahli, Sherali Zeadally
Information Science Faculty Publications
Wireless sensor networks (WSNs) are key components in the emergent cyber physical systems (CPSs). They may include hundreds of spatially distributed sensors which interact to solve complex tasks going beyond their individual capabilities. Due to the limited capabilities of sensors, sensor actions cannot meet CPS requirements while controlling and coordinating the operations of physical and engineered systems. To overcome these constraints, we explore the ecosystem metaphor for WSNs with the aim of taking advantage of the efficient adaptation behavior and communication mechanisms of living organisms. By mapping these organisms onto sensors and ecosystems onto WSNs, we highlight shortcomings that prevent …