Applied Cybersecurity & Internet Governance最新文献

筛选
英文 中文
Assessing Power and Hierarchy in Cyberspace: An Approach of Power Transition Theory 评估网络空间中的权力和等级制度:权力过渡理论
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-27 DOI: 10.60097/acig/190481
Enescan Lorci
{"title":"Assessing Power and Hierarchy in Cyberspace: An Approach of Power Transition Theory","authors":"Enescan Lorci","doi":"10.60097/acig/190481","DOIUrl":"https://doi.org/10.60097/acig/190481","url":null,"abstract":"This study explores the application of Power Transition Theory (PTT) to cyberspace, aiming to establish a comprehensive framework for understanding and measuring cyber power. Utilizing PTT’s national power model, the research treats states as rational and unitary actors, integrating the rational actor model to assess state behavior in cyberspace. The objectives include defining cyber power, developing a novel metric for its evaluation, and\u0000categorizing states within a hierarchical structure of cyber power. By analyzing key components such as data resources, digital economic strength, and cyber political capacity, the study provides a nuanced understanding of cyber power dynamics. The results demonstrate that the traditional IR theories retain relevance in the cyber domain, offering a valuable lens for comprehending global cyber governance and geopolitical competition. This foundational work sets the stage for future analyses of power transitions within cyberspace, highlighting the critical interplay between traditional power metrics and emerging digital landscapes.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"84 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141798194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to Special Issue on The Russian-Ukrainian War: Effects on Global Cybersecurity and Digital Infrastructure 俄乌战争:对全球网络安全和数字基础设施的影响》特刊导言
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-24 DOI: 10.60097/acig/191475
Jacek Leśkow
{"title":"Introduction to Special Issue on The Russian-Ukrainian War: Effects on Global Cybersecurity and Digital Infrastructure","authors":"Jacek Leśkow","doi":"10.60097/acig/191475","DOIUrl":"https://doi.org/10.60097/acig/191475","url":null,"abstract":"","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"20 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stronger together? EU Support for Ukrainian Local Authorities Facing Cyber Attacks (2022-2023) 携手更强大?欧盟支持乌克兰地方当局应对网络攻击(2022-2023 年)
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-23 DOI: 10.60097/acig/190344
I. Fyshchuk
{"title":"Stronger together? EU Support for Ukrainian Local Authorities Facing Cyber Attacks (2022-2023)","authors":"I. Fyshchuk","doi":"10.60097/acig/190344","DOIUrl":"https://doi.org/10.60097/acig/190344","url":null,"abstract":"This study attempts to explore the extent to which EU support during the decentralisation process in Ukraine facilitates local authorities’ digitalisation and strengthens their resilience against cyber attacks. The Ukrainian cyber attack cases are becoming more frequent in 2022 and 2023 in terms of war, especially on the websites of local authorities. The article demonstrates that decentralisation with the support of the EU-funded U-LEAD assistance programme provides an opportunity to bring state services closer to citizens and, accordingly, increase the efficiency of their provision. Decentralisation and digitalisation go hand in hand in the process of implementation in Ukraine. The digitalisation in this direction of local administrations becomes a tool for achieving this goal because it allows local administrations to offer more of their services in a digital format, which ensures the resilience of the development of local authorities. At the same time, the local authorities are less protected against cyber attacks, especially during the war. The article employs a semi-structured interview method to analyse data, revealing that representatives from local authorities participate in various training courses to enhance cybersecurity skills. However, the challenges vary and include issues such as lack of personnel, lack of funding, complex application procedures, lack of coordination, and technical capacity limitations. Indeed, Ukraine is still in the process of improving its own model of cyber defence for local authorities and the country as a whole in terms of countering Russian aggression, using among others practices of NATO and EU countries in the specified field.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"128 41","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141811319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Truth and Information Warfare in their Technological Context 技术背景下的后真相与信息战
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-22 DOI: 10.60097/acig/190407
Ignas Kalpokas
{"title":"Post-Truth and Information Warfare in their Technological Context","authors":"Ignas Kalpokas","doi":"10.60097/acig/190407","DOIUrl":"https://doi.org/10.60097/acig/190407","url":null,"abstract":"As citizens are faced with an overabundance of information, their reliance on intuitive sorting strategies and platform-enabled content selection and delivery increases correspondingly. Under such circumstances, political action tends to be based on haphazard encounters with opinion-congruent content than on anything else, giving rise to so-called post-truth condition and, in turn, opening up conditions for manipulating such information encounters as part of information warfare operations. In particular, this novel environment necessitates a rethinking of informational agency, locating it within interactions between humans and technological artefacts, whereby humans as generators of data and algorithms as tools that structure the information domain based on such data co-construct political and social spaces. The impact of digital technologies is further amplified by the advent of synthetic (Artificial Intelligence-generated) media, which is foreseen to bring about epistemic confusion, that is, increasing inability to separate between reality and fiction. Under such conditions, and in any situations\u0000of actual or perceived crisis and tension, audiences are inclined to rely on narratives as coping strategies, which is where information warfare operations come to the fore. Either capitalising on the existing fertile ground or having manufactured a condition of crisis and distrust, such operations are geared towards hijacking audience cognitive processes with narratives that suit their perpetrators.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"6 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141817430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investment in Cybersecurity Companies in Times of Political and Economic Instability 在政治和经济不稳定时期投资网络安全公司
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-18 DOI: 10.60097/acig/190342
G. Przekota
{"title":"Investment in Cybersecurity Companies in Times of Political and Economic Instability","authors":"G. Przekota","doi":"10.60097/acig/190342","DOIUrl":"https://doi.org/10.60097/acig/190342","url":null,"abstract":"The socio-economic development that has taken place in\u0000recent years takes into account cybersecurity issues. Cybersecurity\u0000has many different dimensions, including the economic dimension.\u0000The Russian-Ukrainian conflict has shown that modern war is not\u0000only conventional, but also cybernetic. Earlier, the massive shift to\u0000remote communication systems forced by COVID also increased\u0000the demand for cybersecurity. This means that cybersecurity com-\u0000panies receive new orders, which can have a positive impact on\u0000their financial results. In the opinion of many experts, investing in\u0000such companies could be a good business. The research conducted\u0000in this article focuses on testing assumptions related to the rec-\u0000ognition of investments in technology companies as prospective\u0000investments. Therefore, this study examines the impact of Russia-\u0000Ukraine war (from February 2022 to December 2024) and the COVID\u0000pandemic (from March 2020 to February 2022) on the valuation of\u0000cybersecurity companies. The period from January 2015 to February\u00002020 was used as the comparative period. The research material\u0000consists of companies and stock indices from the American and\u0000Polish markets. The results of the research are inconclusive. In\u0000fact, there are some examples of companies that took advantage\u0000of the Russian-Ukrainian conflict to achieve above-average returns.\u0000Such a business is risky, which is why these companies are achiev-\u0000ing above-average returns with increased shares price volatility.\u0000However, it turns out that automatically assigning a company to the\u0000cyber or IT category does not mean that it will be a good invest-\u0000ment in times of war or pandemic.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":" 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141826627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russia’s Invasion of Ukraine and National Cyber Security Strategies: Quantitative Compar-ison 俄罗斯入侵乌克兰与国家网络安全战略:定量比较
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-18 DOI: 10.60097/acig/190346
Olesya Vinhas de Souza
{"title":"Russia’s Invasion of Ukraine and National Cyber Security Strategies: Quantitative Compar-ison","authors":"Olesya Vinhas de Souza","doi":"10.60097/acig/190346","DOIUrl":"https://doi.org/10.60097/acig/190346","url":null,"abstract":"Shared understanding of the operational environment\u0000in the cyber domain is the key enabler of NATO’s cyber posture.\u0000However, there have been no attempts to evaluate empirically the\u0000impact of the war in Ukraine on intra-Alliance coherence. This study\u0000applies a novel methodology based on computation text analysis\u0000to evaluate the trends within the recently adopted national cyber\u0000strategies with regards to the description of threats, risks, and\u0000actors involved in carrying out these threats – in particular, Italy,\u0000Latvia, the United Kingdom, and the United States. The analysis\u0000shows that before the large-scale invasion, the congruence was low\u0000between the two continental European states vis-a-vis the UK and\u0000the US on threat and risk assessment. After the invasion, these dif-\u0000ferences became smaller and the language of the updated National\u0000Cyber Security Strategies became more homogeneous as mea-\u0000sured by the cosine similarity scores. There are still differences in\u0000the discussion of relevant actors in cyberspace. The methodology\u0000applied here can be extended to measure the cohesiveness of the\u0000Alliance’s cyber posture along other dimensions.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":" 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141827334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Military Situation Awareness: Ukrainian Experience 军事形势意识:乌克兰的经验
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-17 DOI: 10.60097/acig/190341
V. Putrenko, Nataliia Pashynska
{"title":"Military Situation Awareness: Ukrainian Experience","authors":"V. Putrenko, Nataliia Pashynska","doi":"10.60097/acig/190341","DOIUrl":"https://doi.org/10.60097/acig/190341","url":null,"abstract":"Situational awareness (SA) has become one of the key\u0000concepts in military sector. The Russian-Ukrainian war led to the\u0000development of information technology in Ukraine to manage troops\u0000and combat situations. The army was supported by numerous volun-\u0000teer initiatives involving IT professionals. As a result, Ukrainian army\u0000has received modern software solutions based on the principles of\u0000SA for use in real combat conditions. The purpose of the study is to\u0000analyse the development of military and civilian SA information sys-\u0000tems during the war between Russia and Ukraine. In the course of\u0000the study, the methods of system analysis of the problem of SA were\u0000used. The research classifies information solutions, assesses the dis-\u0000tribution of products by different classification sectors, and conducts\u0000a strengths, weaknesses, opportunities, and threats (SWOT) analysis\u0000of the developed products. Using the example of the most common\u0000solutions, the main features of existing software products and the\u0000technologies on which they operate were identified. Prospects for\u0000the development of solutions, their contribution to military manage-\u0000ment, and problematic issues are identified.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":" 33","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141830066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology of Quantitative Assessment of Network Cyber Threats Using a Risk-Based Approach 基于风险的网络威胁定量评估方法
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-15 DOI: 10.60097/acig/190345
Artem Zhylin, Hanna Holych
{"title":"Methodology of Quantitative Assessment of Network Cyber Threats Using a Risk-Based Approach","authors":"Artem Zhylin, Hanna Holych","doi":"10.60097/acig/190345","DOIUrl":"https://doi.org/10.60097/acig/190345","url":null,"abstract":"The methodology of a quantitative assessment of organ-\u0000isation’s network cyber threats was developed in order to quanti-\u0000tatively assess and compare the cybersecurity threat landscape in\u0000conditions of limited data while applying the risk-oriented approach.\u0000It can be used either for assessing the level of network cyber threats\u0000of a particular organisation (as a quantitative measure of the criti-\u0000cality of cyber threats that are detected within the organisation’s\u0000network) or for comparing the level of network cyber threats of\u0000several organisations during the same or different time periods,\u0000giving grounds for supporting the process of making manage-\u0000rial decisions regarding the organisation’s cybersecurity strategy.\u0000The proposed scheme of the algorithm can be used to automate\u0000the calculation process. The assessment of network cyber threats\u0000that are considered in the article is not a full-fledged measure of\u0000the cyber risk because the methodology was developed consider-\u0000ing the common circumstances of the deficiency of the risk context\u0000data. Nevertheless, the results of the methodology implementation\u0000partially reflect the overall level of the organisation’s cyber risk and\u0000are expected to be used in the case when the full-featured proper\u0000cyber threats assessment can’t be organised for some reason.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141649222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of the cybersecurity of Ukrainian public companies listed on the Warsaw Stock Exchange S.A. 评估在华沙证券交易所(Warsaw Stock Exchange S.A.)上市的乌克兰上市公司的网络安全状况
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-15 DOI: 10.60097/acig/190343
Anna Anna Szczepańska-Przekota
{"title":"Assessment of the cybersecurity of Ukrainian public companies listed on the Warsaw Stock Exchange S.A.","authors":"Anna Anna Szczepańska-Przekota","doi":"10.60097/acig/190343","DOIUrl":"https://doi.org/10.60097/acig/190343","url":null,"abstract":"Nowadays, the number of sophisticated cyberattacks\u0000targeting critical infrastructure or banking systems is increas-\u0000ing. Cases of successful attacks are not uncommon, as statistics in\u0000Ukraine demonstrate, and they are becoming more frequent and\u0000advanced. This results in an increased risk for companies listed on\u0000the stock exchange. The article provides examples of cyberattacks\u0000in Ukraine, including those using ransomware, attempts to infiltrate\u0000energy systems, and attacks on government institutions. It is noted\u0000that the presence of cyber threats is strongly linked to the politi-\u0000cal and international situation of the country. Analyses conducted\u0000focus on the examination of cyber threat events in Ukraine and their\u0000impact on the WIG_UKRAIN stock index from 2015 to 2023. The evalu-\u0000ation includes the index’s return rates on the day of the cyber threat\u0000occurrence, the following day, and the average return rate within five\u0000sessions after the threat. An analogous study for the WIG index is\u0000adopted as a benchmark. Based on the obtained results, it can be\u0000said that before the year 2022, cyberattacks on Ukraine did not have a\u0000significant impact on the value of the Ukrainian company stock index.\u0000The situation changed after 2022, where each potentially economi-\u0000cally harmful cyberattack contributed to the decrease in the value of\u0000Ukrainian-listed companies. Generally, the start of hostilities in 2022\u0000significantly increased the volatility of the WIG_UKRAIN index quota-\u0000tions. This is to be expected, as markets react badly to uncertainty.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"58 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141644303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber influence defense: Applying the DISARM framework to a cognitive hacking case from the Romanian digital space 网络影响防御:将 DISARM 框架应用于罗马尼亚数字空间的认知黑客案例
Applied Cybersecurity & Internet Governance Pub Date : 2024-07-10 DOI: 10.60097/acig/190196
Alina Bârgăoanu, Mihaela Pană
{"title":"Cyber influence defense: Applying the DISARM framework to a cognitive hacking case from the Romanian digital space","authors":"Alina Bârgăoanu, Mihaela Pană","doi":"10.60097/acig/190196","DOIUrl":"https://doi.org/10.60097/acig/190196","url":null,"abstract":"One of the main lessons learned in the context of Russia’s\u0000full-scale invasion of Ukraine starting in February 2022 is that for-\u0000eign information manipulation and interference (FIMI) operations\u0000are closely coupled with cyber threats. Regardless of whether\u0000cyberattacks are followed by an information manipulation compo-\u0000nent and vice versa, the merger of the two can be an early indica-\u0000tor of the potential for a conflict to escalate from the cyber area\u0000to the ground. Our article is premised on the idea that today’s\u0000highly technologised information ecosystem is a fertile ground for\u0000cyberattacks and information manipulation in the context of FIMI;\u0000more specifically, it enables cognitive hacking, meaning hacking\u0000the human mind and human cognition altogether through techno-\u0000logical disruption and cyber pressure. Starting from this premise,\u0000the aim of the article is to highlight the technological determi-\u0000nants of cognitive hacking and identify silent or emerging threats\u0000that bypass technological sensors and seek to disrupt and manip-\u0000ulate the information environment. The empirical part is based on observation as a descriptive method, which is used to analyse\u0000a case of cognitive hacking carried out via a YouTube malvertis-\u0000ing campaign targeting Romanian users. This case study is anal-\u0000ysed qualitatively by matching the DISinformation Analysis & Risk\u0000Management (DISARM) framework with evidence collected through\u0000Open-Source Intelligence (OSINT) tools, following an innovative\u0000analysis structured according to the purposes, actions, results and\u0000techniques (PART) model. The extensive analysis of the identified\u0000case shows that applying the DISARM framework to cyber-enabled\u0000operations can be useful for anticipating and responding to FIMI\u0000threats, even when such operations do not appear to have a spe-\u0000cific, immediately identifiable purpose.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"23 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141658941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信