Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Cyber

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 44

Full-Text Articles in Social and Behavioral Sciences

Public Cyberattack Attribution And Domestic Political Considerations: An Analysis Of State Decision Making, Ella M. Devey May 2024

Public Cyberattack Attribution And Domestic Political Considerations: An Analysis Of State Decision Making, Ella M. Devey

All Graduate Theses and Dissertations, Fall 2023 to Present

When a country is targeted with a cyberattack, what compels its government to publicly attribute the perpetrators of the attack rather than keep their attribution private? Cyberattacks are an increasingly utilized weapon of international conflict by governments, groups, and individuals. Following a cyberattack, the target of the attack may investigate the origin of the attack and may choose to share their findings with the public; alternatively, they may choose not to publicly share their findings.

While we know that forensic capabilities and international political factors contribute to the decision of governments to make public cyberattack attribution, domestic political circumstances may …


Nato Cyber Defence, 2000-2022, Ryan J. Atkinson Aug 2023

Nato Cyber Defence, 2000-2022, Ryan J. Atkinson

Electronic Thesis and Dissertation Repository

The emergence of more devastating and organized cyber attacks by non-attributable threat actors internationally raises questions about whether classical deterrence theory in its contemporary form has assisted important military defence alliances, like the North Atlantic Treaty Organization (NATO), to adapt to the changing threat landscape. The timeline of the NATO Alliance's adaptation to external cyber threats is examined at critical historical junctures. Changes and adaptation within internal policy-making processes at NATO headquarters and its affiliated centres, think tanks, and military bases are analysed with input from informed decision-makers. The research project demonstrates that NATO policy substantively changed over the period …


The Future Of The Cyber Theater Of War, Elizabeth Cook May 2023

The Future Of The Cyber Theater Of War, Elizabeth Cook

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Few could imagine how it would develop when the air was the new theater of war. The literature showcases that a lack of imagination and state-level institutionalized power structures, particularly in the U.S., hampered the progress of air as a new theater of war both in thought and application. Today, a similar lack of imagination on the cyber theater of war is a great source of insecurity in the world system; it sets the stage for strategic shocks like the ones to the U.S. on December 7, 1941, and 9/11. To avoid this, states should imagine how a convergence of …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Raising The Cyber Guard: Analyzing The Cost And Use Of The National Guard In Local Municipal And State Cyber Defense, Hunter Lacroix Jan 2023

Raising The Cyber Guard: Analyzing The Cost And Use Of The National Guard In Local Municipal And State Cyber Defense, Hunter Lacroix

Theses and Dissertations

Cybersecurity is a national priority for the Homeland Security enterprise. Yet, despite a prioritization at the federal level, municipal and state governments have struggled to incorporate the National Guard in cyber incident response. Cyber incidents strain municipalities and states, which have spent significant resources to mitigate cyber threats. The glaring gap in the National Guard’s role in municipal and state cyber incident response warrants two key questions as to why the National Guard isn’t more readily used. “Is it cost prohibitive to use National Guard assets when compared to private entities?” Or “is there an underlying sociological disconnect regarding the …


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


U.S. Warfare Within The Fifth Domain: Deterring Russian Cyber Aggression, Dominick Namias, Jacob Chace Apr 2022

U.S. Warfare Within The Fifth Domain: Deterring Russian Cyber Aggression, Dominick Namias, Jacob Chace

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Unique, Additive, And Interactive Effects Of Types Of Intimate Partner Cybervictimization On Depression In Hispanic Emerging Adults, Jorge I. Cantu, Ruby Charak Jan 2022

Unique, Additive, And Interactive Effects Of Types Of Intimate Partner Cybervictimization On Depression In Hispanic Emerging Adults, Jorge I. Cantu, Ruby Charak

Psychological Science Faculty Publications and Presentations

The advent of modern technology has inadvertently created newer avenues for intimate partner victimization (IPV) to transpire. This study investigated (a) whether psychological, sexual, and stalking intimate partner cybervictimization (cyber IPV) types were uniquely associated with depression and whether there were (b) additive and (c) interactive effects of cyber IPV types on depression, after controlling for face-to-face IPV among Hispanic emerging adults. Participants were 903 Hispanic emerging adults in the age range of 18 to 29 years (M = 20.68, SD = 2.42; 74% female) attending a public university in South Texas. Participants completed an online questionnaire assessing cyber …


An Analysis Of Cyber Wargaming: Current Games, Limitations, And Recommendations, Sarah Chen Jan 2022

An Analysis Of Cyber Wargaming: Current Games, Limitations, And Recommendations, Sarah Chen

CMC Senior Theses

Cyberspace operations and conflict pose a unique challenge to decision-makers due to the uncertainty and unpredictability of cyber capabilities. Relying on wargaming literature, public cyber wargame reports, and expert interviews, this thesis analyzes the utility of cyber wargaming for education and analysis. Cyber wargames offer a method of testing, exploring, and understanding cyberspace through the abstraction and representation of cyber tools and attack cycles.

The thesis begins by examining cyber conflict and theorizes hypothetical wargame use cases. It then creates a framework for cyber wargaming elements and examines the design of eleven analytical wargames, eight educational wargames, and three commercial …


Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii Jul 2021

Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii

Journal of Strategic and Global Studies

Current information has become a very important commodity. Some even say that our society is already in an "information-based society". The ability to access and provide information quickly and accurately is very important for an organization, such as companies, universities, government agencies, and individuals. Once the importance of the value of information causes often the desired information can only be accessed by certain people. The fall of information in the hands of other parties can cause harm to the information owner. Security issues are an important aspect of an information system management. Unfortunately, this security problem often gets less attention …


Full Spectrum Space Deterrence: From Laws To Technology, Joshua Carlson Mar 2021

Full Spectrum Space Deterrence: From Laws To Technology, Joshua Carlson

Honors Theses

Conflict in space is becoming an ever-real possibility, with the potential of rendering the space completely useless for future generations. Current talks are centered around limiting or preventing any weapons deployed to space, but this is not the most effective way of dealing with the issue. The focus should shift to agreeing on how nations should act responsibly in space together instead of preventing nations from acting at all. The best way of accomplishing this goal is by improving satellite design, creating agreed upon and understood rules of engagement, fostering widespread cooperation between nations, and choosing not to be the …


The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi Jan 2021

The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi

FIU Electronic Theses and Dissertations

Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.

This …


Strategic Culture And Cyber Strategy, Andrew S. Olejarski Jan 2021

Strategic Culture And Cyber Strategy, Andrew S. Olejarski

Honors Undergraduate Theses

The intent of this paper is to explore the relationship between strategic culture theory and how it interacts with war-parallel usage of cyber methods. Cyber methods, at times incorrectly classified as "cyberwarfare", as a means of statecraft are becoming increasingly prevalent, and developing an understanding of how states use them, particularly during conflicts, would be a great boon to the field of security studies. Strategic culture theory, an international relations theory focusing on the relationship between culture and strategy, may be an effective means to analyze conflict-parallel use of cyber methods. This paper will consider the relationship between strategic culture …


Unique And Cumulative Effects Of Intimate Partner Cybervictimization Types On Alcohol Use In Lesbian, Gay, And Bisexual Emerging Adults, Oscar Trujillo, Jorge I. Cantu, Ruby Charak Nov 2020

Unique And Cumulative Effects Of Intimate Partner Cybervictimization Types On Alcohol Use In Lesbian, Gay, And Bisexual Emerging Adults, Oscar Trujillo, Jorge I. Cantu, Ruby Charak

Psychological Science Faculty Publications and Presentations

The use of modern technology has inadvertently created newer platforms for intimate partner victimization to take place. The present study investigated (i) whether psychological, sexual, and stalking intimate partner cybervictimization (cyber IPV) types were uniquely associated with alcohol use, and (ii) whether there were additive effect of cyber IPV types on alcohol use, after controlling for histories of childhood maltreatment types, face-to-face intimate partner victimization among lesbian, gay, and bisexual (LGB) emerging adults. Participants were 277 self-identifying LGB individuals in the age range of 18-29 years (M = 25.39, SD = 2.77; 16.6% lesbian, 25.6% gay, 43% bisexual women). Participants …


Making The War Colleges Better, Richard A. Lacquement Jr Nov 2019

Making The War Colleges Better, Richard A. Lacquement Jr

The US Army War College Quarterly: Parameters

No abstract provided.


Cyberbullying And School Climate, Emily Payton Fisher Jul 2018

Cyberbullying And School Climate, Emily Payton Fisher

Masters Theses & Specialist Projects

The purpose of this study was to examine the relationships between demographic variables known to predict bullying and victimization, traditional bullying victimization, cyberbullying victimization, and school climate. Participants were 214 fourth and fifth grade students from three elementary schools in Warren County, Kentucky. Students answered demographic questions and completed a series of surveys including the Positive Experience Checklist and the School Climate Survey Suite. Demographic variables and traditional bullying victimization were regressed on the students’ perception of school climate (Model 1). Additionally, cyberbullying victimization was included in a second block to estimate its explanatory value (Model 2). The present study …


An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh Apr 2018

An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh

Electronic Theses and Dissertations

Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:

  • Discussion and Dialogue

  • Research

  • Confidence Building Measures

  • Incident Response

  • Crime …


Crossing The Digital Divide: Monism, Dualism And The Reason Collective Action Is Critical For Cyber Theory Production, Christopher Whyte Jan 2018

Crossing The Digital Divide: Monism, Dualism And The Reason Collective Action Is Critical For Cyber Theory Production, Christopher Whyte

L. Douglas Wilder School of Government and Public Affairs Publications

In studying topics in cyber conflict and cyber-security governance, scholars must ask—arguably more so than has been the case with any other emergent research agenda—where the epistemological and ontological value of different methods lies. This article describes the unique, dual methodological challenges inherent in the multifaceted program on global cyber-security and asks how problematic they are for scholarly efforts to construct knowledge about digital dynamics in world affairs. I argue that any answer to this question will vary depending on how one perceives the social science enterprise. While traditional dualistic perspectives on social science imply unique challenges for researcher, a …


Born To Run: A Grounded Theory Study Of Cheating In The Online Speedrunning Community, Christopher G. Brewer Aug 2017

Born To Run: A Grounded Theory Study Of Cheating In The Online Speedrunning Community, Christopher G. Brewer

Master's Theses

Video games represent a growing genre of media quickly becoming one of the leading forms of entertainment (Jordan, 2014). This popularity has allowed new playstyles to emerge across the video game genre, such as e-Sports and speedrunning. In particular, the speedrunning community has somewhat redefined what it means to “cheat” in a video game by accepting the use certain software and hardware violations that could be seen as “cheating” to the general gaming community. This paper examined the social construction of cheating in this digital community through the use of grounded theory methods.


Strategic Insights: Speed Kills—Enter An Age Of Unbridled Hyperconnectivity, Nathan P. Freier Mr. Jun 2017

Strategic Insights: Speed Kills—Enter An Age Of Unbridled Hyperconnectivity, Nathan P. Freier Mr.

Articles & Editorials

No abstract provided.


A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott Apr 2017

A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott

Penn State Journal of Law & International Affairs

No abstract provided.


The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown Apr 2017

The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown

Penn State Journal of Law & International Affairs

No abstract provided.


People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green Dec 2016

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green

Military Cyber Affairs

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …


Waging Wars In Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare. Could Iran Legally Retaliate For The Stuxnet Attack?, Willa Rubin Jan 2016

Waging Wars In Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare. Could Iran Legally Retaliate For The Stuxnet Attack?, Willa Rubin

Honors Papers

The technical capabilities of the Stuxnet worms-launched by the US and Israel against Iran's nuclear facility-prove that the operation could be considered an act of aggression, as defined in the Rome Statute. Further, this paper asserts that Article 51 of the UN Charter is insufficient to addressing malignant cyber operations.

The paper is organized as following: 1) Introduction, 2) Research Limitations, 3) Context: International Relations Theory and Types of International Law, 4) Understanding “Cyber” Within The Scope Of This Paper, 5) The Stuxnet Operation, 6) Historical and Legal Roots of “Aggression” and “Self-Defense”, 7) Stuxnet as an act of aggression, …


Webcam Child Sex Abuse, Lena Masri Dec 2015

Webcam Child Sex Abuse, Lena Masri

Capstones

Webcam child sex is a booming global industry, a twist in pedophilia as fast growing and difficult to police, according to law enforcement officials.


Seksualitas Cyber: Sex Sebagai Kesenangan Dan Komoditas, Puji Rianto Dec 2015

Seksualitas Cyber: Sex Sebagai Kesenangan Dan Komoditas, Puji Rianto

Informasi

Abstract
This paper wants to explore further how sexuality is present in the cyber world. Although the construction of human sexuality age as the man himself, the construction or representation will be largely determined by the social context. Different characters from the cyber world where political authority and the gatekeeper do not contribute significantly will influence the construction of sexuality. The study found that sex is understood as a pleasure and commodities. Various reports of sexual offenders describe how the pleasure of sexual intercourse highly revered. Along with the cult of sexuality as pleasure is sex as a commodity, which …


Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg Jun 2015

Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg

Jan Kallberg

Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …


Cyberbullying Prevention: Intervention Effects On Student Involvement, Sarah Nash Bumpas Mar 2015

Cyberbullying Prevention: Intervention Effects On Student Involvement, Sarah Nash Bumpas

Graduate Theses, Dissertations, and Capstones

Repeated studies show that cyberbullying is pervasive amongst adolescents. Cyberbullying can lead to self-harm, depression, and suicidal thoughts. Educators are called to intervene in educating students about cyberbullying through research and federal legislation. However, there is little research examining whether this education is taking place or having an effect.

This study investigates the relationship between the incidences of cyberbullying victimization and offending over time and the direct cyberbullying instruction and activities facilitated by classroom teachers. The study took place amongst sixth graders in Jefferson County Public Schools, a large urban school district located in northern Kentucky. Students in one school …


Enabling Cyber Physical Systems With Wireless Sensor Networking Technologies, Multiagent System Paradigm, And Natural Ecosystems, Nafaâ Jabeur, Nabil Sahli, Sherali Zeadally Jan 2015

Enabling Cyber Physical Systems With Wireless Sensor Networking Technologies, Multiagent System Paradigm, And Natural Ecosystems, Nafaâ Jabeur, Nabil Sahli, Sherali Zeadally

Information Science Faculty Publications

Wireless sensor networks (WSNs) are key components in the emergent cyber physical systems (CPSs). They may include hundreds of spatially distributed sensors which interact to solve complex tasks going beyond their individual capabilities. Due to the limited capabilities of sensors, sensor actions cannot meet CPS requirements while controlling and coordinating the operations of physical and engineered systems. To overcome these constraints, we explore the ecosystem metaphor for WSNs with the aim of taking advantage of the efficient adaptation behavior and communication mechanisms of living organisms. By mapping these organisms onto sensors and ecosystems onto WSNs, we highlight shortcomings that prevent …