Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (2)
- Computer Sciences (2)
- Databases and Information Systems (2)
- Defense and Security Studies (2)
- Engineering (2)
-
- International Relations (2)
- Management Information Systems (2)
- Organizational Behavior and Theory (2)
- Other Computer Sciences (2)
- Peace and Conflict Studies (2)
- Physical Sciences and Mathematics (2)
- Policy Design, Analysis, and Evaluation (2)
- Political Theory (2)
- Public Affairs (2)
- Public Policy (2)
- Risk Analysis (2)
- Criminology (1)
- Eastern European Studies (1)
- Gender and Sexuality (1)
- International and Area Studies (1)
- Other International and Area Studies (1)
- Policy History, Theory, and Methods (1)
- Politics and Social Change (1)
- Social Control, Law, Crime, and Deviance (1)
- Sociology (1)
- Publication
Articles 1 - 3 of 3
Full-Text Articles in Other Political Science
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
Feminist Resistance In Serbia, Donna M. Hughes Dr., Lepa Mladjenovic, Zorica Mrsevic
Feminist Resistance In Serbia, Donna M. Hughes Dr., Lepa Mladjenovic, Zorica Mrsevic
Donna M. Hughes
In the last four years the Socialist Federal Republic of Yugoslavia has broken apart. Driven by nationalism, the wars in Slovenia, Croatia and Bosnia have killed an estimated 300,000 people, wounded another 1,500,00 and forced 4,500,000 people to become refugees. While the world see daily reports of Serbian aggression and nationalist extremism, feminists in Serbia have been protesting all acts of aggression, included that advocated by their own government and supporting the victims of violence.