2,969 research outputs found

    Global Shipping Game \u2710

    Get PDF
    During the period 8-9 December 2010, the United States Naval War College (NWC) in Newport, Rhode Island hosted the Global Shipping Game (GSG). The GSG was developed and executed at the direction of the Chief of Naval Operations (CNO). The purpose of the GSG was to explore strategic-level implications as a result of future changes in global shipping patterns. The CNO directed the NWC to develop a game that would explore changes in economic and trade patterns within the context of two future scenarios: expansion of the Panama Canal in 2020 and increased access of commercial shipping through the Arctic by 2035. After reviewing the research literature, the GSG was honed to explore two overarching research questions based on the CNO?s areas of interest: What are the broad, strategic security implications for the United States posed by projected changes in shipping patterns as a result of the Panama Canal expansion? What are the broad, strategic security implications for the United States posed by projected changes in shipping patterns as a result of the opening of the Arctic? In addition to the two primary research questions, the GSG also examined the following two subsidiary questions: What, if any, are the impacts to U.S. security interests for failing to ratify the United Nations Convention on Law of the Sea (UNCLOS) Treaty based on projected changes in shipping patterns as a result of either the Panama Canal expansion or the opening of the Arctic? What challenges, if any, will expansion of the Panama Canal or the opening of the Arctic present to U.S. naval forces engaged in ensuring the free flow of goods at sea while maintaining forward global presence

    Confidence building measures as soft power? : a contribution to the study of international cybersecurity

    Get PDF
    Masteroppgave i samfunnskommunikasjon- Universitetet i Agder 2013The topic of this thesis is“CBMs and international cooperation within cybersecurity”. The central research question it examines is: How can the use of CBMs in diplomacy enhance international cooperation within cybersecurity? In order to investigate this issue, I decided to conduct a number of in-depth interviews with experts within this field; these two groups of experts primarily consist of diplomats and researchers. Myfindings can be divided in two parts; the first concerns consequences of the emergence of the network society for diplomacy; the second part regards possibilities and limits of CBMs within international cybersecurity.Issues related to transparency, terminology and imageconstitute the core of these findings. The studydemonstrates that communication is a fundamental part of confidence building. Whileagreeing on specificmultilateral CBMs within cybersecurity appears to be a difficult task at this early stage of international discussions, efforts at reaching agreement on cyber CBMs can be a type of CBM in itself.CBMs createmutualunderstanding, build relations and ultimately reduce the risk of misunderstanding and misperceptions which could lead to wrong decisions and the escalation of conflicts.Soft power represents a useful way to approach these issues as soft power and CBMs can be mutually reinforcing

    Aerospace Cyber-Physical Systems Education

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/106495/1/AIAA2013-4809.pd

    Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats

    Get PDF
    Advanced cybersecurity threats with automated capabilities are on the rise in industries such as finance, healthcare, technology, retail, telecoms, and transportation, as well as government. It is necessary to conduct analyses of cybersecurity-related resources and capabilities to build cybersecurity intelligence (CI). The purpose of this paper is to suggest a dynamic capability in a cybersecurity intelligence (DCCI) model based on existing literature that helped firms reduce risks of cyber violations and advance the development of systems and the life cycle of firms. Through a meta-synthesis, an abduction and induction approach through eight methodological steps analyzed in forty-seven case studies the presence of cybersecurity capabilities to build CI. Combining theoretical and practical information security maturity models as a foundation, we understand capabilities building to improve the predictability of cyber incidents. The results evidenced four second-order dimensions to build CI named doing, enabling, improving, and managing cybersecurity, and eight first-order outcomes to represent the DCCI model. This research makes an unprecedented contribution to international and national scenarios, as it will allow firms to innovate their resource management processes and abilities to enable better cybersecurity projects and reduce the impacts of potential cyberattacks with the probability of eradicating vulnerabilities

    Strengthening rules-based order in the Asia-Pacific

    Get PDF
    This paper explores the opportunities for both Australia and Japan jointly to promote their shared interest in strengthening the rule of law in the Asia–Pacific. Overview The rule of law is an essential condition if cooperation and orderly behaviour are to be advanced in the Asia–Pacific. We need norms and rules that guide—and govern—relations among regional states. Australia and Japan share an interest in minimising the role that coercion plays in the Asia–Pacific and maximising cooperation across the region. We’re both liberal democracies, with a strong bilateral security relationship, an alliance with the United States and a genuine commitment to the rule of law. All Asia–Pacific states would profit by following Australia and Japan’s example in promoting and abiding by the rule of law in their external policies. Indeed, our region would be a much safer place if they did. ASPI has this year worked on a project to explore the opportunities for both Australia and Japan jointly to promote our shared interest in strengthening the rule of law in the Asia–Pacific. This report sets out the project’s key findings and outlines policy proposals to enhance Australia–Japan cooperation to bolster the rule of law in the region

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    U.S. Energy Sector Cybersecurity: Hands-Off Approach or Effective Partnership?

    Get PDF
    Recent reporting has identified significant threats to the U.S. energy’s critical infrastructure from nation states and other groups through cyberspace. Efforts to improve the security and resilience of U.S. energy infrastructure relies upon voluntary partnerships between the U.S. Government and public and private energy infrastructure owners. This paper examines ideal Public-Private Partnership (PPP) characteristics and compares them to an actual PPP in the U.S. The results identify strengths of and challenges to efforts to secure U.S. energy infrastructure. The research was conducted through a combination of literature reviews and interviews with a sample of U.S-government and private-energy infrastructure representatives

    The Challenge of Resilience in a Globalised World

    Get PDF
    Resilience determines the capacity to successfully deal with difficult events and to adapt and overcome adversity. It creates stability in a changing world which in turn promotes job creation, economic growth and environmental sustainability. Resilience is a fundamental prerequisite for Europe as the largest integrated economic area in the world and has an important social dimension which requires the active cooperation of all stakeholders; citizens, the private sector, governments and NGOs included. This report discusses the concept of resilience from different perspectives and the role of science in the continuous process of building a resilient, stable, competitive and prosperous Europe.JRC.G-Institute for the Protection and Security of the Citizen (Ispra

    Federated Robust Embedded Systems: Concepts and Challenges

    Get PDF
    The development within the area of embedded systems (ESs) is moving rapidly, not least due to falling costs of computation and communication equipment. It is believed that increased communication opportunities will lead to the future ESs no longer being parts of isolated products, but rather parts of larger communities or federations of ESs, within which information is exchanged for the benefit of all participants. This vision is asserted by a number of interrelated research topics, such as the internet of things, cyber-physical systems, systems of systems, and multi-agent systems. In this work, the focus is primarily on ESs, with their specific real-time and safety requirements. While the vision of interconnected ESs is quite promising, it also brings great challenges to the development of future systems in an efficient, safe, and reliable way. In this work, a pre-study has been carried out in order to gain a better understanding about common concepts and challenges that naturally arise in federations of ESs. The work was organized around a series of workshops, with contributions from both academic participants and industrial partners with a strong experience in ES development. During the workshops, a portfolio of possible ES federation scenarios was collected, and a number of application examples were discussed more thoroughly on different abstraction levels, starting from screening the nature of interactions on the federation level and proceeding down to the implementation details within each ES. These discussions led to a better understanding of what can be expected in the future federated ESs. In this report, the discussed applications are summarized, together with their characteristics, challenges, and necessary solution elements, providing a ground for the future research within the area of communicating ESs
    corecore