Showing 71 - 80 of 6,507
There is a great deal of buzz surrounding the Internet of Things (IoT), which is the notion, simply put, that nearly everything not currently connected to the Internet from gym shorts to factories soon will be. The Industrial Internet of Things (IIoT) is one application of this trend and...
Persistent link: https://www.econbiz.de/10014111232
Online hacking from China, Iran, North Korea, Russia, and other parts of the world has caught the attention of U.S. policymakers, commentators, and the American public. For example, the discussion of the systematic attacks launched by potentially government-sponsored Chinese hackers reinforces...
Persistent link: https://www.econbiz.de/10014134100
This Article analyzes State involvement in cybersecurity, particularly policies aimed at mitigating cyber threats below the armed attack threshold — cybercrime and espionage. Although the focus is on national cybersecurity strategies, related domestic follow-up initiatives are also considered,...
Persistent link: https://www.econbiz.de/10014134237
Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes...
Persistent link: https://www.econbiz.de/10014134844
Beyond doubt the humanity has entered an age of data dominance. As the need for safety and predictability grows, it becomes increasingly difficult to balance security and individual civil liberties. Therefore, the balance between security and these liberties is not constant and perfect, given...
Persistent link: https://www.econbiz.de/10014135875
The United States and Canada are interdependent along a number of dimensions, including the two nations’ mutual reliance on shared critical infrastructure. As a result, regulatory efforts aimed at securing critical infrastructure in one nation impact the other, including in the cybersecurity...
Persistent link: https://www.econbiz.de/10014137310
This article reviews developments in cybercrime in the ten years to 2014. It observes that in the basic substance of cybercrime offences is essentially the same as in the past. However, cybercrimes are now executed with greater sophistication, increasingly for purposes of financial gain, and by...
Persistent link: https://www.econbiz.de/10014139973
There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s...
Persistent link: https://www.econbiz.de/10014140227
If we were to acknowledge cyberspace as a standalone strategic domain, I believe it is quite natural to talk about “geography” and “sovereignty” in terms of IR, power, and security within cyber arena as well. Indeed, decrypting the geopolitics of cyberspace may be quite difficult...
Persistent link: https://www.econbiz.de/10014140915
Persistent link: https://www.econbiz.de/10013363134