• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 3
  • Tagged with
  • 11
  • 11
  • 6
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Waging Warfare Against States: The Deployment of Artificial Intelligence in Cyber Espionage

Wan Rosli, Wan R. January 2026 (has links)
Yes / Cyber espionage has significantly been viewed as a risk towards nation-states, especially in the area of security and protection of Critical National Infrastructures. The race against digitisation has also raised concerns about how emerging technologies are defining how cyber activities are linked to waging warfare between States. Real-world crimes have since found a place in cyberspace, and with high connectivity, has exposed various actors to various risks and vulnerabilities, including cyber espionage. Cyber espionage has always been a national security issue as it does not only target States but also affects public-private networks, corporations and individuals. The challenge of crimes committed within the cyber realm is how the nature of cybercrimes distorts the dichotomy of state responsibility in responding to cyber threats and vulnerabilities. Furthermore, the veil of anonymity and emerging technologies such as artificial intelligence have further provided opportunities for a larger scale impact on the state for such crime. The imminent threat of cyber espionage is impacting the economic and political interactions between nation-states and changing the nature of modern conflict. Due to these implications, this paper will discuss the current legal landscape governing cyber espionage and the impact of the use of artificial intelligence in the commission of such crimes. / The full-text of this article will be released for public view at the end of the publisher embargo, 12 months after first publication.
2

Cybersecurity and non-state actors : a historical analogy with mercantile companies, privateers, and pirates

Egloff, Florian J. January 2018 (has links)
The thesis investigates how the historical analogy to mercantile companies, privateers, and pirates between the 16th and 19th century can elucidate the relationship between non-state actors and states in cyber(in-)security, and how such an application changes our understanding of cyber(in-)security. It contributes to a better integration of non-state actors into the study of cyber(in-)security and international security by clarifying the political challenges raised by the interaction between these players and states. Drawing on the literature of non-state armed actors, the thesis defines a spectrum of state proximity to develop an analytical framework categorizing actors as state, semi-state, and non-state. The historical investigation utilizes primary and secondary sources to explore three periods in British naval history: the late 16th, late 17th, and mid-19th centuries. A comparison of the two security domains - the sea and cyberspace - identifies the pre-18th century periods as the most useful analogues for cyber(in-)security. The thesis evaluates the analogy by conducting empirical case studies. First, the case of the attacks against Estonia (2007) and three criminal court cases against Russian hackers (2014/2017) examine the analogy to pirates and privateers. Second, the analogy to mercantile companies focuses on the attacks against Google (2009), the attacks against Sony Pictures Entertainment (2014), and the collaboration between large technology companies and Five-Eyes signals intelligence agencies. The thesis makes three main claims: first, the analogy to piracy and privateering provides a new understanding of how state proximity is used politically by attackers and defenders, and offers lessons for understanding attribution in cyberspace. Second, the longevity of historical privateering sheds light on the long-term risks and rewards of state collaboration with cyber criminals, and offers insight into the political constitution of cyber(in-)security. Third, the mercantile company lens improves our understanding of how cooperative and conflictive relations between large technology companies and states influence cyber(in-)security.
3

Guerra e ciberespaço : uma análise a partir do meio físico

Leal, Marcelo Mesquita January 2015 (has links)
O presente artigo tem por objetivo demonstrar a importância do meio físico como variável explicativa fundamental para o estudo da ciberguerra. O argumento central desenvolvido afirma que o transporte efetivo de informações no ciberespaço durante a guerra depende da posse de ativos estratégicos que garantam a interconexão entre dispositivos eletrônicos por meio de redes resilientes e seguras, e que a posse, a localização e o controle desses ativos é condição prévia e necessária para a consecução de uma estratégia de defesa cibernética. A partir de um arcabouço teórico clausewitziano e de uma análise de redes em camadas, esse artigo conclui que tanto no plano estratégico (ativos nacionais) quanto no plano operacional e tático (redes militares críticas) o acesso e a livre movimentação no ciberespaço é fortemente dependente do meio físico. / This paper aims to demonstrate the importance of the physical medium as a key explanatory variable for the study of cyberwar. The central argument defends that the effective transport of information in cyberspace during war depends on the possession of strategic assets to ensure the connection between electronic devices via resilient and secure networks, and that the ownership, location and control of these assets is a prior and necessary condition to the achievement of a cyber defense strategy. From a Clausewitzian theoretical framework, and through an analysis of layered network architecture, this paper concludes that in both strategic (domestic assets) and operational and tactical (critical military networks) levels the access and unrestricted movement in cyberspace depends greatly on the physical medium.
4

Guerra e ciberespaço : uma análise a partir do meio físico

Leal, Marcelo Mesquita January 2015 (has links)
O presente artigo tem por objetivo demonstrar a importância do meio físico como variável explicativa fundamental para o estudo da ciberguerra. O argumento central desenvolvido afirma que o transporte efetivo de informações no ciberespaço durante a guerra depende da posse de ativos estratégicos que garantam a interconexão entre dispositivos eletrônicos por meio de redes resilientes e seguras, e que a posse, a localização e o controle desses ativos é condição prévia e necessária para a consecução de uma estratégia de defesa cibernética. A partir de um arcabouço teórico clausewitziano e de uma análise de redes em camadas, esse artigo conclui que tanto no plano estratégico (ativos nacionais) quanto no plano operacional e tático (redes militares críticas) o acesso e a livre movimentação no ciberespaço é fortemente dependente do meio físico. / This paper aims to demonstrate the importance of the physical medium as a key explanatory variable for the study of cyberwar. The central argument defends that the effective transport of information in cyberspace during war depends on the possession of strategic assets to ensure the connection between electronic devices via resilient and secure networks, and that the ownership, location and control of these assets is a prior and necessary condition to the achievement of a cyber defense strategy. From a Clausewitzian theoretical framework, and through an analysis of layered network architecture, this paper concludes that in both strategic (domestic assets) and operational and tactical (critical military networks) levels the access and unrestricted movement in cyberspace depends greatly on the physical medium.
5

Guerra e ciberespaço : uma análise a partir do meio físico

Leal, Marcelo Mesquita January 2015 (has links)
O presente artigo tem por objetivo demonstrar a importância do meio físico como variável explicativa fundamental para o estudo da ciberguerra. O argumento central desenvolvido afirma que o transporte efetivo de informações no ciberespaço durante a guerra depende da posse de ativos estratégicos que garantam a interconexão entre dispositivos eletrônicos por meio de redes resilientes e seguras, e que a posse, a localização e o controle desses ativos é condição prévia e necessária para a consecução de uma estratégia de defesa cibernética. A partir de um arcabouço teórico clausewitziano e de uma análise de redes em camadas, esse artigo conclui que tanto no plano estratégico (ativos nacionais) quanto no plano operacional e tático (redes militares críticas) o acesso e a livre movimentação no ciberespaço é fortemente dependente do meio físico. / This paper aims to demonstrate the importance of the physical medium as a key explanatory variable for the study of cyberwar. The central argument defends that the effective transport of information in cyberspace during war depends on the possession of strategic assets to ensure the connection between electronic devices via resilient and secure networks, and that the ownership, location and control of these assets is a prior and necessary condition to the achievement of a cyber defense strategy. From a Clausewitzian theoretical framework, and through an analysis of layered network architecture, this paper concludes that in both strategic (domestic assets) and operational and tactical (critical military networks) levels the access and unrestricted movement in cyberspace depends greatly on the physical medium.
6

Offensive Cyber Operations: An Examination of Their Revolutionary Capabilities

Wardle, Madelyn 28 May 2021 (has links)
No description available.
7

Projecting Power in the Fifth Domain : An assessment of why states use proxies for offensive cyber operations

Hjelm, Mattias January 2021 (has links)
In the 21st century, cyber operations have become the modern manifestation of political warfare between great powers. Many states have made considerable efforts to build up their respective cyber commands. Contrary, or as a complement to this, some states choses to rely upon actors detached from the state for conducting their operations online. What incentives explain this strategy? There are inherent risks with employing proxies and states nowadays have an ability to conduct cyber operations from central military commands. This presents a puzzle. By using a comparative case study approach, this thesis provides a portrait of how two leading cyber actors, Russia and The United States employ different strategies in the digital domain. To understand the motivations behind state delegation of cyber conflict, this thesis applies Principal-Agent theory to explain the relationships states cultivate with non-state actors. I propose a framework containing three hypotheses that ought to affect the decision to delegate; cyber proxies offer states a possibility to enhance their capabilities, save cost and evade accountability. Through analysing the cases, I find that the use of cyber proxies could partly be explained by my hypotheses rooted in the PA theory. Lower internal cyber capability and the desire to save costs may explain why states choses to use proxies in the digital domain. However, the empirical evidence is not strong enough to suggest that cyber proxies offer states a possibility to evade accountability. Rather, it is the cyber domain itself that complicates attribution efforts. Consequently, the findings do not confirm the hypothesis that cyber proxies provide enhanced plausible deniability benefits compared to government agents. In spite of that, this thesis concludes that cyber proxies together with their implications for escalatory dynamics will probably remain challenging in the foreseeable future.
8

The Other means? Examining the patterns and dynamics of state competition in cyberspace

Vicic, Jelena January 2021 (has links)
No description available.
9

Online Analogies: The Legal Uncertainities of Cyberspace : A Study on Cyber Operations and the Jus ad Bellum

Munck af Rosenschöld, Henrietta January 2023 (has links)
No description available.
10

State Cyber Operations and International Law: Russian and Western Approaches

Davis, Brandon S. 27 August 2018 (has links)
No description available.

Page generated in 0.1069 seconds