1,745 research outputs found

    What Ukraine Taught NATO about Hybrid Warfare

    Get PDF
    Russia’s invasion of Ukraine in 2022 forced the United States and its NATO partners to be confronted with the impact of hybrid warfare far beyond the battlefield. Targeting Europe’s energy security, Russia’s malign influence campaigns and malicious cyber intrusions are affecting global gas prices, driving up food costs, disrupting supply chains and grids, and testing US and Allied military mobility. This study examines how hybrid warfare is being used by NATO’s adversaries, what vulnerabilities in energy security exist across the Alliance, and what mitigation strategies are available to the member states. Cyberattacks targeting the renewable energy landscape during Europe’s green transition are increasing, making it urgent that new tools are developed to protect these emerging technologies. No less significant are the cyber and information operations targeting energy security in Eastern Europe as it seeks to become independent from Russia. Economic coercion is being used against Western and Central Europe to stop gas from flowing. China’s malign investments in Southern and Mediterranean Europe are enabling Beijing to control several NATO member states’ critical energy infrastructure at a critical moment in the global balance of power. What Ukraine Taught NATO about Hybrid Warfare will be an important reference for NATO officials and US installations operating in the European theater.https://press.armywarcollege.edu/monographs/1952/thumbnail.jp

    Medical students' narratives of peer bullying in women

    Get PDF
    This study uncovered complicated social dynamics of women students in an accelerated, combined degree program, specifically the narratives of students who experienced peer bullying. Individual and collective narratives were developed using narrative inquiry and through a feminist lens, this study reviews Queen Bee Syndrome and its parallel constructs in a medical education setting. Study participants revealed varying degrees of bullying. Findings include risks and rewards of friendships in women, unveiling frequent gossip and commitment to or ostracizing from social groups. Further, this study revealed participants had tendencies to acquiesce to or become autonomous to bullying behaviors. Several factors, including mental health, academic failure, competition, and sexism, influenced bullying experiences among students. Finally, participants described a social world where being one's best self was particularly important to their social standing. Implications for research, policy, and practice include additional work on mental health and student success, student wellness, proactive interventions, and additional research on men students.Includes bibliographical references (pages 119-130)

    Habits of whiteness in the neighborhood: a critical race analysis of urban ministry paradigms

    Get PDF
    Recent decades have seen an increased interest among predominantly white, middle-class evangelicals in church planting and organizing ministries in urban centers, often in racially diverse neighborhoods undergoing the process of gentrification. This thesis will analyze the phenomenon of white urban ministry through the lens of critical whiteness studies and psychoanalytic theory, drawing on Shannon Sullivan's notion of whiteness as unconscious habit characterized by ontological expansiveness. I propose that sincere efforts on the part of white urban ministry practitioners to form and nurture diverse communities rooted in place are impeded by habitual modes of relationship to place formed in predominantly white contexts, which reproduce, however unintentionally, patterns of white supremacy and displacement of people of color. The thesis begins with a survey of print and online sources including accounts by white urban ministry practitioners and critiques of their models. I then address the theological and affective motives and rationales for these models, and examine their relationship to wider social patterns of gentrification. Next I will analyze these patterns in light of the work of critical theorists on whiteness, focusing on the nature of white relationship to place shaped by centuries of colonialism. Developmental psychology will then be employed to account for white habit formation, drawing upon Kohut's account of the development of grandiosity. I conclude by calling for a paradigmatic shift toward de-centering whiteness, drawing upon theological and psychological resources to transform white relationship to place into one of respect and deference to diverse ways of being

    Why Do Some Aboriginal Communities Have Lower Crime Rates Than Others? A Pilot Study

    Full text link
    Crime data collated by the New South Wales (NSW) Bureau of Crime Statistics and Research (BOCSAR) indicates that there is considerable variation in rates of Indigenous1 offending from one area to another in NSW, including in areas that are comparable in terms of Indigenous population. However, despite research findings that raise the importance of community context in relation to the offending of Indigenous individuals, there has been little investigation of the relationship between the dynamics of Indigenous communities and crime rates. In particular, there is a dearth of research that seeks to better understand the factors that may render Indigenous communities less prone to crime. This article outlines the findings of a pilot study undertaken by a research team from Jumbunna Indigenous House of Learning at the University of Technology Sydney, with support from BOCSAR. The pilot study sought to better understand the factors that contribute to variations in rates of Indigenous offending by conducting qualitative research in two communities with significant Aboriginal populations â Wilcannia and Menindee â that are demographically and geographically comparable but with contrasting crime rates

    Categorising Network Telescope data using big data enrichment techniques

    Get PDF
    Network Telescopes, Internet backbone sampling, IDS and other forms of network-sourced Threat Intelligence provide researchers with insight into the methods and intent of remote entities by capturing network traffic and analysing the resulting data. This analysis and determination of intent is made difficult by the large amounts of potentially malicious traffic, coupled with limited amount of knowledge that can be attributed to the source of the incoming data, as the source is known only by its IP address. Due to the lack of commonly available tooling, many researchers start this analysis from the beginning and so repeat and re-iterate previous research as the bulk of their work. As a result new insight into methods and approaches of analysis is gained at a high cost. Our research approaches this problem by using additional knowledge about the source IP address such as open ports, reverse and forward DNS, BGP routing tables and more, to enhance the researcher's ability to understand the traffic source. The research is a BigData experiment, where large (hundreds of GB) datasets are merged with a two month section of Network Telescope data using a set of Python scripts. The result are written to a Google BigQuery database table. Analysis of the network data is greatly simplified, with questions about the nature of the source, such as its device class (home routing device or server), potential vulnerabilities (open telnet ports or databases) and location becoming relatively easy to answer. Using this approach, researchers can focus on the questions that need answering and efficiently address them. This research could be taken further by using additional data sources such as Geo-location, WHOIS lookups, Threat Intelligence feeds and many others. Other potential areas of research include real-time categorisation of incoming packets, in order to better inform alerting and reporting systems' configuration. In conclusion, categorising Network Telescope data in this way provides insight into the intent of the (apparent) originator and as such is a valuable tool for those seeking to understand the purpose and intent of arriving packets. In particular, the ability to remove packets categorised as non-malicious (e.g. those in the Research category) from the data eliminates a known source of `noise' from the data. This allows the researcher to focus their efforts in a more productive manner

    Three Essays on Information-Securing in Organizations

    Get PDF
    This dissertation is intended to interpret, analyze, and explain the interplay between organizational structure and organizational information systems security by mapping structural contingency theory into three qualitative studies. The research motivation can be attributed in two ways. First, Johnson and Goetz\u27s (2007) conception of embedding information in organizations as part of their field research interviewing security executives serves as a methodological inspiration for the series of three studies reported here. The point that security should be infused into organization activities instead of serving as a bolted-on function is a central tenet guiding the development of this dissertation. Second, a macro approach is employed in the studies reported here, aimed at a theoretical expansion from existing behavioral security studies which typically take a micro perspective, while mitigating potential theoretical reductionism due to a predominant research concentration on individual components of organizational information security instead of the holistic function of the firm. Hence, this dissertation contributes to the behavioral organizational security research by positing a theoretical construct of information-securing, an organizational security process which is essentially characterized by dualism, dynamism, and democratism. With a macro organizational perspective on the elements of information securing, organizations can effectively discover and leverage organization-wide resources, efforts, and knowledge to cope with security contingencies. The first study of this dissertation is designed to investigate the nature of employees’ extra-role behaviors. This study investigated how employees might sometimes take steps beyond the requirements of the organizational-level security policy in order to facilitate effective workgroup operation and to assist less-skilled colleagues. The second study of this dissertation conducts an interpretive study of the role of information systems auditing in improving information security policy compliance in the workplace, with a specific focus on the role of non-malicious insiders who unknowingly or innocuously thwart corporate information security directives by engaging in unsafe computing practices. The last study of the dissertation explores the interplay between organizational structures and security activities. The organizational perspective of security bureaucracies is developed with three specific bureaucratic archetypes to define the evolutionary stages of the firm’s progress through evolving from coercive rule-based enforcement regimes to fully enabled and employee-centric security cultures in the workplace. Borrowing from Weberian metaphors, the characterization of security bureaucracies evolving from an “iron cage” to an “iron shield” is developed. These three studies revolving around the general notion of information-securing are deemed to be a promising start of a new stream of organizational IS security research. In order to enrich and extend our IS security literature, the perspective advocated in this dissertation suggests a shift in the epistemological paradigm of security behaviors in organizations from the prevailing micro views to macro perspectives which will result in very useful new perspectives on security management, security behaviors and security outcomes in organizations. GS Form 14 (8/10) APPROVAL FOR SCHOLAR

    A Survey of the European Security Market

    Get PDF
    This document synthesizes the results of the research made on the European security market. It deals with questions of interest regarding the provision of security goods and services for protecting society from terrorism and organised crime. It explores issues such as market revenues, demand and supply, industrial capabilities, technology, research and development, innovation, business strategies, competition as well as market structure, agents' conduct and economic performance. The research has been based upon desk analysis of open source information related to the security market. Economic theory and critical analysis has been applied to understand the gathered information, derive knowledge, point out key issues and assess trends and drivers that will likely shape the sector's future. The study is the outcome of the working package number 5 included in the research project A new Agenda for European Security Economics (EUSECON). This project with code number 218195 has been financed by the European Commission within the 7th European Research Framework Programme. The task has been performed by the company ISDEFE according to the scope and work plan described in the EUSECON proposal. The author wishes to express his appreciation to all the individuals that have provided input and valuable comments to this study, including anonymous referees. Any flaws or omissions contained in this document are solely the responsibility of the author.
    corecore