Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2)
- Databases and Information Systems (2)
- Defense and Security Studies (2)
- International Relations (2)
- Military and Veterans Studies (2)
-
- Organizational Behavior and Theory (2)
- Other Computer Sciences (2)
- Other Political Science (2)
- Peace and Conflict Studies (2)
- Physical Sciences and Mathematics (2)
- Policy Design, Analysis, and Evaluation (2)
- Political Science (2)
- Political Theory (2)
- Public Affairs (2)
- Public Affairs, Public Policy and Public Administration (2)
- Public Policy (2)
- Social and Behavioral Sciences (2)
- Accounting (1)
- Accounting Law (1)
- Business Law, Public Responsibility, and Ethics (1)
- Business Organizations Law (1)
- Business and Corporate Communications (1)
- Communications Law (1)
- Comparative and Foreign Law (1)
- Computer Law (1)
- Criminal Law (1)
- Institution
- Publication
Articles 1 - 3 of 3
Full-Text Articles in Management Information Systems
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …
Designer Satellite Collisions From Covert Cyber War, Jan Kallberg
Designer Satellite Collisions From Covert Cyber War, Jan Kallberg
Jan Kallberg
Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …