74 research outputs found

    Review of Krista Wiegand's <i>Enduring Territorial Disputes</i>

    Get PDF
    No abstract available

    DIPL 1711 Introduction to International Relations

    Get PDF
    This course is an introduction to the study of International Relations (IR). It is designed to help the student uncover how scholars and practitioners understand international relations by putting the major theories and issue areas within the discipline in a historical and active perspective. The course leverages classic, primary, and novel online source materials to present key concepts in International Relations

    DIPL 6130 International Security

    Get PDF
    International security is a broad focus in the international relations field on conflict, war, and instability as states and non-state actors alike struggle in an insecure world. This course will survey the major topics and themes in security including war, technology, and modern strategy, providing a gateway for those who wish to undertake advanced research in the field. The student will also be required to think and develop ideas like a policymaker confronted with an international crisis, seeking to provide solutions to the pressing questions of the time in geopolitics

    DIPL 3470 Cyber Security and International Relations

    Get PDF
    This course explores the role that cyber security and cyber warfare play in intentional relations. It will examine the interactions, planning, history, and recent actions of states, the private sector, and the international community in cyberspace. We will explore how states and other actors leverage cyberspace to pursue goals and strategic objectives

    Conceptualising cyber arms races

    Get PDF
    This paper investigates the emergence of an arms racing dynamic in the international cyber domain. The numerous claims made of an ongoing cyber arms race by the media and other analysts have not been backed up by careful empirical analysis. Characterised by the competitive and rapid mutual build-up of capabilities between pairs of states, arms races are a long standing aspect of study in international relations, with statistical evidence suggesting a relationship between these factors and war. Our work extends the tradition of arms race scholarship to the field of cyber security by providing a methodology for accounting for the build-up of cyber capabilities by nation states. We examine the concept of the cyber arms race and provide a plausibility probe for a macro study by examining the cases of the United States and Iran, and of North Korea and South Korea. We employ time series data on a number of indicators to measure each state’s scale of increase in cyber capabilities, before investigating whether the states in question are directing their efforts against one another. Our findings suggest that these state dyads have indeed been engaged in cyber arms races, as defined by their competitive and above-normal mutual increase in cyber capabilities. This work furthers our understanding of state behaviour in the cyber domain, and our methodology helps to establish a pathway for the future extensive data collection of this new phenomenon

    How We Stopped Worrying about Cyber Doom and Started Collecting Data

    Get PDF
    Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field

    Ensayos sobre aplicación de la Teoría del Estado en las algunas culturas del Perú antiguo

    Get PDF
    Investigations of State Theory on the cultures of ancient Peru.Capítulos de libro con investigaciones de Teoría del Estado sobre las culturas del Perú antiguo, realizado por docentes y estudiantes de la Escuela Profesional de Derecho de la Universidad Nacional del Altiplano de Puno.      

    Ensayos sobre aplicación de la Teoría del Estado en las algunas culturas del Perú antiguo

    Get PDF
    Investigations of State Theory on the cultures of ancient Peru.Capítulos de libro con investigaciones de Teoría del Estado sobre las culturas del Perú antiguo, realizado por docentes y estudiantes de la Escuela Profesional de Derecho de la Universidad Nacional del Altiplano de Puno.      
    corecore