10,582 research outputs found

    The DoD Law of War Manual and its Critics: Some Observations

    Get PDF
    The U.S. Department of Defense’s (DoD) new Law of War Manual has generated serious debate about its treatment of a variety of issues including human shields, the status of journalists, cyber operations, the precautions to be taken prior to attacks and even the role of honor in war. Although this article does not purport to be a comprehensive response to every critique of the Manual and, indeed, cites opportunities for its improvement, it nevertheless concludes that on balance the Manual provides an excellent, comprehensive and much-needed statement of DoD’s view of the lex lata of the law of war

    On the complexity of collaborative cyber crime investigations

    Get PDF
    This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime. The opportunities, operational environment and modus operandi of a cyber criminal are considered, with a view to developing the skills and procedural support that investigators might usefully consider in order to respond more effectively to the investigation of cyber crimes across State boundaries

    Who’s at stake? The role of the stakeholder in UK tech policy

    Get PDF
    The idea of the ‘stakeholder’ is prevalent in discussions of technology policy. But who counts as a stakeholder, who holds power over who is included, whose voice is left out of technology policy discourses and practices? The aim of this project is to gain a critical understanding of the definition and role of the ‘stakeholder’ in the development of technology policy. What counts as a ‘stake’? Who has a ‘stake’? In this report, we present an analysis of 195 UK tech policy documents, assessed for the usage of the term stakeholder and citational practices. We also present results of a workshop with government, academia and civil society discussing policy practices, and provide recommendations for more representative processes for tech policy.Funded by a Solent University RIKE grant

    Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes

    Get PDF
    View the Executive SummaryAn analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms regarding what is and is not a moral and ethical use of these technologies. It may be possible for academics and policymakers to come together to work for a ban or build-down on cyber weapons patterned on international efforts to ban chemical and biological weapons and implement export regimes to control the export of code which may form the components of cyber weapons. If we conceptualize cyberspace as territory, we can also learn from the example of territorially-based confidence-building measures such as those implemented along the Indo-Pakistan border. This approach stresses the importance of developing notification procedures to prevent misperceptions and the escalation spiral, as well as communicating regularly to establish trust between all parties. The case studies presented here illustrate the promises and pitfalls of each approach and offer valuable warnings to policymakers seeking to implement such measures in cyberspace. They show what happens when not everyone in a regime is equally committed to a specific outcome by illustrating the difficulties of monitoring compliance in confidence-building regimes, and show the ways in which doctrines and confidence-building measures may not be perfectly aligned.https://press.armywarcollege.edu/monographs/1455/thumbnail.jp

    Police functional adaptation to the digital or post digital age: discussions with cybercrime experts.

    Get PDF
    This article examines the challenges of functional adaptation faced by the police in response to technologically driven changes in the nature of crime. It also recounts how research under the auspices of a ‘dark web’ research project resulted in a search for an effective approach to engaging with investigators dealing with cybercrime. In doing so it tested, as a research methodology, a standard change implementation tool (problem tree analysis) from the Disaster Management and Sustainable Development (DMSD) discipline. This in turn resulted in significant consideration being given to the physical space in which that methodology is used. It presents the results of a workshop held with cybercrime investigators (not all were police officers) in terms of the importance of four key organisational and cultural issues (management, leadership and institutional ethos within the police; the risks of over-complication and exaggerated distinctions between cyber and real world policing; ethics; and knowledge, training and development) alongside the development and acquisition of new technical capabilities

    Managing and Teaching Ethics in Higher Education

    Get PDF
    Following the development of Globethics.net’s new Strategy, Vision and Mission, the Globethics.net International Conference 2018 came as an honest contribution to the urgent search for solutions to a world noticeably and without doubt in disarray, as problems continue to mount. ‘How can we translate and make ethics practically present and relevant in the classroom and lives of students, teachers and professionals who emerge from higher education institutions?’ More than 100 teachers, policy makers, research fellows, vice-chancellors, ethics and scientific institutions, consultants, NGOs, IGOs and other stakeholders gathered from all over the world during three days to answer this question. The conference took place on 4–6 June 2018 at the Château de Bossey in the county of Vaud, Switzerland. This book is structured into two parts: the first is composed of discussions and ethical puzzles meant to bring breakthrough insights from the Globethics.net International Conference on ethics in higher education; the second part features selected papers that disclose the conference proceedings

    The EU’s Approach to Cybersecurity

    Get PDF

    Identifying the science and technology dimensions of emerging public policy issues through horizon scanning

    Get PDF
    Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique [1]. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security.Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique [1]. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security

    Design Thinking for Cyber Deception

    Get PDF
    Cyber deception tools are increasingly sophisticated but rely on a limited set of deception techniques. In current deployments of cyber deception, the network infrastructure between the defender and attacker comprises the defence/attack surface. For cyber deception tools and techniques to evolve further they must address the wider attack surface; from the network through to the physical and cognitive space. One way of achieving this is by fusing deception techniques from the physical and cognitive space with the technology development process. In this paper we trial design thinking as a way of delivering this fused approach. We detail the results from a design thinking workshop conducted using deception experts from different fields. The workshop outputs include a critical analysis of design provocations for cyber deception and a journey map detailing considerations for operationalising cyber deception scenarios that fuse deception techniques from other contexts. We conclude with recommendations for future research
    corecore