To see the other types of publications on this topic, follow the link: Cyber influence operations.

Journal articles on the topic 'Cyber influence operations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber influence operations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Van Niekerk, Brett, and Trishana Ramluckan. "Towards Norms for State Responsibilities regarding Online Disinformation and Influence Operations." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 500–509. http://dx.doi.org/10.34190/eccws.22.1.1121.

Full text
Abstract:
The Internet has provided a global mass communication system, and in particular social media technologies began a social revolution for the public sphere. However, these platforms have been exploited for the purposes of influence operations and disinformation campaigns to hinder or subvert national decision-making processes by affecting the policy makers, voters, or swaying general public opinion. Often this is achieved through manipulative means falling within a grey area of international and constitutional systems. Existing proposed normative frameworks for responsible state behaviour in Cyb
APA, Harvard, Vancouver, ISO, and other styles
2

Neilsen, Rhiannon. "Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities." Ethics & International Affairs 37, no. 2 (2023): 161–76. http://dx.doi.org/10.1017/s0892679423000187.

Full text
Abstract:
AbstractIntelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent atrocities? I suggest that using cyber manipulat
APA, Harvard, Vancouver, ISO, and other styles
3

ŠTRUCL, DAMJAN. "RUSSIAN AGGRESSION ON UKRAINE: CYBER OPERATIONS AND THE INFLUENCE OF CYBERSPACE ON MODERN WARFARE." CONTEMPORARY MILITARY CHALLENGES 2022, no. 2 (2022): 103–23. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.24.2.6.

Full text
Abstract:
Abstract The contemporary security environment is global, dynamic, and unpredictable, particularly in terms of providing cyber security and cyber defence. Numerous analyzes of Russian hybrid operations have shown that the Russian Federation is conducting a number of cyber operations to achieve its politically strategic goals. Despite such debates, the Russo-Ukrainian war represents a new turning point in the global security environment, as many non-state actors have become involved in the conflict and cyberspace has become a tool for implementing sanctions. Thus, the article aims to analyze th
APA, Harvard, Vancouver, ISO, and other styles
4

Kralovánszky, Kristóf. "Certain Connections between Cyber Operations, Artificial Intelligence and Operational Domains." Hadtudományi Szemle 14, no. 4 (2021): 5–16. http://dx.doi.org/10.32563/hsz.2021.4.1.

Full text
Abstract:
The relationship of operational domains with various systems based on artificial intelligence is becoming more profound and more diverse. The ability to influence decision-making mechanisms can pose serious risks that need to be identified and interpreted. Cyberspace is the carrier of artificial intelligence, but the latter as an operational domain has not yet been identified. The goal of this study is to examine certain relationships between cyberspace, artificial intelligence, and operational domains from a state-will enforcement perspective, using mostly qualitative tools, combined with qua
APA, Harvard, Vancouver, ISO, and other styles
5

Maschmeyer, Lennart. "The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations." International Security 46, no. 2 (2021): 51–90. http://dx.doi.org/10.1162/isec_a_00418.

Full text
Abstract:
Abstract Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than for
APA, Harvard, Vancouver, ISO, and other styles
6

Divyam, Misser. "AI-Powered Detection and Prevention of Deepfake Deception in Cyber Influence Operations." Journal of Research and Innovation in Technology, Commerce and Management Vol. 2, Issue 5 (2025): 2560–64. https://doi.org/10.5281/zenodo.15423512.

Full text
Abstract:
The accelerated development of deepfake technology has generated tremendous concern regarding its potential abuse in cyber influence operations. Deepfake-created media, such as doctored videos and fake audio, are increasingly utilized to manipulate audiences, influence public opinion, and propagate disinformation. This study discusses the use of artificial intelligence (AI) to detect and prevent deepfake deception. We offer an extensive review of AI-based deep fake detection techniques, including convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformer models (fi
APA, Harvard, Vancouver, ISO, and other styles
7

Sarjakivi, Pietari, Jouni Ihanus, and Panu Moilanen. "Using Wargaming to Model Cyber Defense Decision-Making: Observation-Based Research in Locked Shields." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 457–64. http://dx.doi.org/10.34190/eccws.23.1.2270.

Full text
Abstract:
Defensive Cyber Operations (DCO) in complex environments, such as cyber wargames, require in-depth cybersecurity knowledge and the ability to make quick decisions. In a typical DCO, execution rarely follows a pre-planned path because of extensive adversary influence, challenging an already complex decision-making environment. Decision-making models have been extensively studied from perspectives of military operations and business management, but they are not sufficiently researched in the context of cyber. This paper responds to this need by examining the decision-making models of DCO leaders
APA, Harvard, Vancouver, ISO, and other styles
8

Sartonen, Miika, Aki-Mauri Huhtinen, Petteri Simola, Kari T. Takamaa, and Veli-Pekka Kivimäki. "A Framework for the Weapons of Influence." International Journal of Cyber Warfare and Terrorism 10, no. 1 (2020): 34–49. http://dx.doi.org/10.4018/ijcwt.2020010103.

Full text
Abstract:
The development of communications technology has enabled the internet to become a new theatre of military operations. The influence aspects of military operations in information battlespace, however, are difficult both in theory and in practice, especially concerning international law. As a result, there is a variety of national and organizational solutions of how to divide tasks and responsibilities between authorities. This asymmetry generated by different approaches and rules of conduct provides opportunities for actors with more relaxed interpretation of international law, allowing them to
APA, Harvard, Vancouver, ISO, and other styles
9

Sander, Barrie. "Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections." Chinese Journal of International Law 18, no. 1 (2019): 1–56. http://dx.doi.org/10.1093/chinesejil/jmz003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tanodomdej, Papawadee. "The Tallinn Manuals and the Making of the International Law on Cyber Operations." Masaryk University Journal of Law and Technology 13, no. 1 (2019): 67–86. http://dx.doi.org/10.5817/mujlt2019-1-4.

Full text
Abstract:
The Tallinn Manuals (the Manuals) attempted to clarify how to apply existing international law to cyber operations. Though the Manuals are non-binding instruments, the Group of International Experts claimed that they reflected the lex lata applicable to cyber operations. However, this claim is questionable due to the dominating role of a few Western states in the drafting process and the linked neglect of the practice of “affected states” in cyber operations. This article examines the quality of the Manuals’ drafting process and the composition and impartiality of the experts involved. It focu
APA, Harvard, Vancouver, ISO, and other styles
11

Danyk, Yuriy, and Chad Briggs. "Modern Cognitive Operations and Hybrid Warfare." Journal of Strategic Security 16, no. 1 (2023): 35–50. http://dx.doi.org/10.5038/1944-0472.16.1.2032.

Full text
Abstract:
Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.
APA, Harvard, Vancouver, ISO, and other styles
12

Baraniuk, Kamil, and Piotr Marszałek. "The potential of Cyber Threat Intelligence analytical frameworks in research on information operations and influence operations." Przegląd Bezpieczeństwa Wewnętrznego 16, no. 31 (2024): 279–320. https://doi.org/10.4467/20801335pbw.24.027.20804.

Full text
Abstract:
The article’s aim is to evaluate the utility of using the Cyber Threat Intelligence (CTI) approach in analysing information and influence operations. The study was carried out by a comparative method based on the technique of desk research. The point of comparison for the CTI methodology were methods originated in communicology, which are relatively popular in the study of propaganda. The authors try to answer the question of what methodological contribute to the study of the discussed phenomena – and thus to the practical potential of the analyst’s workshop – is the adoption of a paradigm for
APA, Harvard, Vancouver, ISO, and other styles
13

ALEKSEIEVA, O. "Cyber weapons: concept, its manifestations and countermeasures." INFORMATION AND LAW, no. 3(50) (September 4, 2024): 162–69. http://dx.doi.org/10.37750/2616-6798.2024.3(50).311720.

Full text
Abstract:
The article is devoted to the analysis of the concept of “cyber weapons”. Modern approaches to its definition are highlighted, its signs and types are defined. The range of criminal purposes for the use of cyber weapons has been established. It is noted that cyber weapons have become a serious means of informational influence in cyberspace as a new theater of military operations. Foreign and domestic approaches to defining cyberspace are analyzed. Proposals were made to counter the use of cyber weapons in national cyberspace. Attention is drawn to the need to implement legislative initiatives
APA, Harvard, Vancouver, ISO, and other styles
14

Dr. Zeeshan Faisal Khan. "Cyber Warfare and International Security: A New Geopolitical Frontier." Critical Review of Social Sciences Studies 3, no. 2 (2025): 513–27. https://doi.org/10.59075/k9cbhz04.

Full text
Abstract:
Cyber warfare has become a major geopolitical frontier, fundamentally changing the international security landscape. This article explores the evolving nature of cyber warfare and its implications for geopolitics, national security, and global strategic stability. Unlike conventional warfare, cyber conflict takes place in an invisible, borderless digital space, allowing state and non-state actors to engage in destructive activities with relative anonymity. The asymmetric nature of cyber warfare challenges traditional power dynamics, allowing smaller powers to challenge technologically superior
APA, Harvard, Vancouver, ISO, and other styles
15

Piekarska, Aleksandra. "CONTEMPORARY INFLUENCE OPERATIONS IN CYBERSPACE - AN ANALYSIS OF THE PHENOMENON." Cybersecurity & Cybercrime 1, no. 4 (2024): 48–61. http://dx.doi.org/10.5604/01.3001.0054.4297.

Full text
Abstract:
The information contained in this chapter attempts to provide a comprehensive analysis of the phenomenon of influence operations as one of the most rapidly developing threats in cyberspace. It presents a number of considerations arising from a wide range of activities of different types of actors (state, non-state, etc.), as well as definitions of 'cyberspace', 'influence operations', and 'active measures'. It also discusses specific examples of influence operations, the tools used in their process and techniques to combat them. The chapter is based on the author's thesis entitled Influence op
APA, Harvard, Vancouver, ISO, and other styles
16

Whyte, Christopher. "Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online." European Journal of International Security 5, no. 2 (2020): 195–214. http://dx.doi.org/10.1017/eis.2020.2.

Full text
Abstract:
AbstractAt present, most scholarship on the potential for escalation in cyberspace couches analysis in terms of the technological dynamics of the domain for relative power maneuvering. The result has been a conceptualisation of the logic of operation in cyberspace as one of ‘tit-for-tat’ exchanges motivated by attribution problems and limited opportunity for strategic gain. This article argues that this dominant perspective overlooks alternative notions of how cyber tools are used to influence. This, in turn, has largely led scholars to ignore second-order effects – meaning follow-on effects t
APA, Harvard, Vancouver, ISO, and other styles
17

Topor, Lev, and Alexander Tabachnik. "Russian Cyber Information Warfare: International Distribution and Domestic Control." Journal of Advanced Military Studies 12, no. 1 (2021): 112–27. http://dx.doi.org/10.21140/mcuj.20211201005.

Full text
Abstract:
Cyber information warfare (IW) is a double-edged sword. States use IW to shape the hearts and minds of foreign societies and policy makers. However, states are also prone to foreign influence through IW. This assumption applies mainly to liberal democratic societies. The question examined in this article is how Russia uses IW on other countries but protects itself from the same activities. The authors’ main argument is that while Russia executes influence operations and IW in cyberspace, it strives for uncompromising control over its domestic cyberspace, thus restricting undesirable informatio
APA, Harvard, Vancouver, ISO, and other styles
18

Jimmy, Fnu. "Assessing the Effects of Cyber Attacks on Financial Markets." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 288–305. http://dx.doi.org/10.60087/jaigs.v6i1.254.

Full text
Abstract:
Cyber-attacks on financial markets have emerged as a significant threat to global economic stability, disrupting market operations, compromising sensitive data, and undermining investor confidence. This study explores the multifaceted impact of cyber-attacks on financial markets, examining both the immediate and long-term effects on market performance, regulatory response, and overall market resilience. By analyzing recent incidents, this research highlights how cyber-attacks influence stock prices, trading volumes, and market volatility, shedding light on the vulnerabilities within financial
APA, Harvard, Vancouver, ISO, and other styles
19

Diao, Zhifeng, and Fanglei Sun. "Fuzzy Harmony Search Technique for Cyber Risks in Industry 4.0 Wireless Communication Networks." Processes 11, no. 3 (2023): 951. http://dx.doi.org/10.3390/pr11030951.

Full text
Abstract:
Industry 4.0 houses diverse technologies including wireless communication and shared networks for internal and external operations. Due to the wireless nature and remote operability, the exposure to security threats is high. Cyber risk detection and mitigation are prominent for secure industrial operations and planned outcomes. In addition, the system faces the threat of intelligence attacks, security standards issues, privacy concerns and scalability problems. The cyber risk related research problems influence overall data transmission in industry wireless communication networks. For augmenti
APA, Harvard, Vancouver, ISO, and other styles
20

Pačková, Miroslava. "Active Measures Concept Deconstruction Through the Lenses of Information Influence." Vojenské rozhledy 33, no. 1 (2024): 40–62. http://dx.doi.org/10.3849/2336-2995.33.2024.01.040-062.

Full text
Abstract:
This study deconstructs the concept of active measures through the prism of information influence. It understands it as sophisticated methods of influencing public opinion and political decisions, originally used by the Soviet Union and now adapted to cyberspace by the Russian Federation. In the analysis, the concept is contrasted with the general abstraction of information influence. This helps to better understand the proximity of active measures to similar concepts. We conclude that abstractions of information influence are also valid for conceptual understanding and practical examples of c
APA, Harvard, Vancouver, ISO, and other styles
21

Baloch, Muhammad Umar Farooq. "AI in Modern Warfare: Impacts on Information Operations, Cyber Conflicts, and C2 Systems." SOCIAL PRISM 2, no. 2 (2025): 15–28. https://doi.org/10.69671/socialprism.2.2.2025.39.

Full text
Abstract:
This research delves into the transformative influence of artificial intelligence (AI) on modern military operations, emphasizing its impact on information warfare, cyber conflicts, and command and control (C2) systems. With the rapid evolution of AI technologies, their incorporation into military strategies has introduced significant complexities, bolstering both offensive and defensive capacities. The initial section explores AI's application in information warfare, where AI-powered tools enable automation in strategies such as disinformation campaigns, targeted propaganda, and social media
APA, Harvard, Vancouver, ISO, and other styles
22

Damons, Daphne. "Weaponizing Connectivity: The Role of Social Media and Cyberspace in Modern Subversion." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 857–63. https://doi.org/10.34190/eccws.24.1.3450.

Full text
Abstract:
The proliferation of social media has revolutionized modern warfare, transformed the nature of conflict and redefined the rules of engagement (Arquilla & Ronfeldt, 1993). The rapid evolution of social media platforms, with their speed and anonymity, has created complex tools with far-reaching impacts on global security and stability (Kaplan & Haenlein, 2010). The threat landscape has evolved significantly, shifting from traditional warfare to cyber operations short of war, which have significant implications for state power and global security. Thus, the traditional notion of warfare h
APA, Harvard, Vancouver, ISO, and other styles
23

Dempsey, Thomas. "Spreading Lies Through the Cyber Domain." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 559–66. http://dx.doi.org/10.34190/eccws.22.1.1082.

Full text
Abstract:
The expansion of Information Operations (IO) over the past ten years has allowed individuals and groups to increase their sphere of influence on a global scale. Nation-state cyber threat actors have increased their presence on social media, building out false personas to influence large populations. This type of activity is difficult to stop due to the availability of social networks on the internet and the ease of creating false personas that can’t be directly attributed to the actor. IO activity has been observed with the Russian cyber activity during the 2016 U.S. Presidential elections and
APA, Harvard, Vancouver, ISO, and other styles
24

Mitra, Amit, and Kamran Munir. "Influence of Big Data in managing cyber assets." Built Environment Project and Asset Management 9, no. 4 (2019): 503–14. http://dx.doi.org/10.1108/bepam-07-2018-0098.

Full text
Abstract:
Purpose Today, Big Data plays an imperative role in the creation, maintenance and loss of cyber assets of organisations. Research in connection to Big Data and cyber asset management is embryonic. Using evidence, the purpose of this paper is to argue that asset management in the context of Big Data is punctuated by a variety of vulnerabilities that can only be estimated when characteristics of such assets like being intangible are adequately accounted for. Design/methodology/approach Evidence for the study has been drawn from interviews of leaders of digital transformation projects in three or
APA, Harvard, Vancouver, ISO, and other styles
25

Bellavista, Paolo, and Carlo Giannelli. "Cyber Physical Sensors and Actuators for Privacy- and Cost-Aware Optimization of User-Generated Content Provisioning." International Journal of Distributed Sensor Networks 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/396136.

Full text
Abstract:
Nowadays there is growing interest in evolving the distributed sensors concept from the more traditional one of enabling technology to monitor the surrounding physical environmenttowards Cyber Physical Systems (CPS) sensors and actuators, that is, as a suitable tool to measure/influence the cyber activity of possibly worldwide communities of users (e.g., any geotagged operation leaving a cyber footprint and any cyber physical incentive to stimulate activity as in crowdsensing). To leverage this novel perspective, we propose a framework to integrate at bestmultilayer CPS sensors and actuatorsas
APA, Harvard, Vancouver, ISO, and other styles
26

Sova, Oleg. "Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system." Technology audit and production reserves 4, no. 2(66) (2022): 25–28. http://dx.doi.org/10.15587/2706-5448.2022.261874.

Full text
Abstract:
The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication devices
APA, Harvard, Vancouver, ISO, and other styles
27

Oleg, Sova. "Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system." Technology audit and production reserves 4, no. 2(66) (2022): 25–28. https://doi.org/10.15587/2706-5448.2022.261874.

Full text
Abstract:
<em>The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication dev
APA, Harvard, Vancouver, ISO, and other styles
28

Neag, Mihai Marcel. "Physiognomy of Military Operations Answer to Hybrid Threats." International conference KNOWLEDGE-BASED ORGANIZATION 24, no. 1 (2018): 163–70. http://dx.doi.org/10.1515/kbo-2018-0024.

Full text
Abstract:
Abstract The widening of the spectrum, the diversity of forms of manifestation of hybrid threats, the influence of economic, political, diplomatic, informational and psychological aspects, now occupy, more than ever, a very important place in the architecture of military operations, but also the fact that the evolution of technology in the field of communications, informatics and cyber defense led to an exponential increase in the power of information. The timely and pertinent threat analysis of the hybrid warfare allows military decision-makers to identify, through an elaborate and pragmatic
APA, Harvard, Vancouver, ISO, and other styles
29

Raţiu, Aurelian, and Claudiu-Marius Sălăvăstru. "The Influence of Non-Kinetic Actions on Multi-Domain Operations Command and Control." International conference KNOWLEDGE-BASED ORGANIZATION 30, no. 1 (2024): 1–9. http://dx.doi.org/10.2478/kbo-2024-0021.

Full text
Abstract:
Abstract In the current context, the way military actions are carried out determines rethinking the military leadership and approaching it through the lens of hybrid, non-kinetic approaches, of high precision technologies and of those that integrate all areas of military operations. Potential adversaries are increasingly using non-kinetic warfare strategies that include subversive and disinformation campaigns, espionage and cyber attacks. Thus, non-kinetic actions are relevant elements for military operations requiring the implementation of new operating and command-control concepts. In modern
APA, Harvard, Vancouver, ISO, and other styles
30

Østby, Knut, Kirsi Helkala, and Ole Joachim Aasen. "Educating New Military Leaders to be Robust against Influence Operations: A Case Study." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 348–55. http://dx.doi.org/10.34190/eccws.23.1.2100.

Full text
Abstract:
Influence operations and cognitive warfare are part of the new complex threat picture that Norway and other nations face. In general, military education and leadership education have traditions in place to build robustness against war demands, but how to build robustness against influence operations is still almost non-existing. In this case study, we show how an educational module on influence operations was conducted at the Norwegian Defence University College’s Cyber Academy department and how this module contributed to strengthening robustness against cognitive warfare. The impact of the e
APA, Harvard, Vancouver, ISO, and other styles
31

Kilani, Yanal. "Cyber-security effect on organizational internal process: mediating role of technological infrastructure." Problems and Perspectives in Management 18, no. 1 (2020): 449–60. http://dx.doi.org/10.21511/ppm.18(1).2020.39.

Full text
Abstract:
Adopting the technologies among organizations comes with the continuous worries of protection and hacking. The idea of cyber-security has become over the years the main interest of many organizations, which depend on technologies in its operations, which requires them to pay extra attention to their technological infrastructure. The current study aims at examining the influence of cyber-security forces on organizational internal operations and the role of technological infrastructure in defining and controlling the level of protection that cyber-security has on organizational internal processe
APA, Harvard, Vancouver, ISO, and other styles
32

Fausett, Crystal M., and Joseph R. Keebler. "Shift Happens: Human Factors Considerations for Handoffs in Cyber-Security Operations Centers." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 110–14. http://dx.doi.org/10.1177/1071181322661131.

Full text
Abstract:
Cybersecurity breaches have consequences not only at a technical level, but also at economic, legal, individual levels. Organizations depend heavily on the internet to conduct daily operations and activities. As cyber threats increase with frequency and severity, organizations and the cybersecurity experts they employ are facing an uphill battle. To our knowledge, very little research has been done to investigate the handoff processes that exist in Security Operations Centers (SOCs). Researchers and practitioners within the cybersecurity community would benefit from a better understanding of h
APA, Harvard, Vancouver, ISO, and other styles
33

Thomas, Misoi K., Dr James Ogalo, and Dr Ben Maake. "The Effects of Cost Implications in the Adoption of Biometric Application Banks in Eldoret Town, Kenya." Indian Journal of Image Processing and Recognition 3, no. 6 (2023): 1–6. http://dx.doi.org/10.54105/ijipr.k1633.103623.

Full text
Abstract:
Biometric technology utilizes biological and behavioral characteristics to automatically identify individuals. The paper was guided by the question on how does cost implications affect for adoption of biometric application in authorization and identification in banks in Eldoret Town. Cost of implications does not influence for adoption of biometric application in authorization and identification in banks in Eldoret Town. Thus, this study will help government agencies, financial institutions and other corporate business in adopting biometric systems. The research indicated cost implications aff
APA, Harvard, Vancouver, ISO, and other styles
34

Misoi, K. Thomas. "The Effects of Cost Implications in the Adoption of Biometric Application Banks in Eldoret Town, Kenya." Indian Journal of Image Processing and Recognition (IJIPR) 3, no. 6 (2023): 1–6. https://doi.org/10.54105/ijipr.K1633.103623.

Full text
Abstract:
<strong>Abstract: </strong>Biometric technology utilizes biological and behavioral characteristics to automatically identify individuals. The paper was guided by the question on how does cost implications affect for adoption of biometric application in authorization and identification in banks in Eldoret Town. Cost of implications does not influence for adoption of biometric application in authorization and identification in banks in Eldoret Town. Thus, this study will help government agencies, financial institutions and other corporate business in adopting biometric systems. The research indi
APA, Harvard, Vancouver, ISO, and other styles
35

Górka, Marek. "Catalysts of Cyber Threats on the Example of Visegrad Group Countries." Politics in Central Europe 18, no. 3 (2022): 317–42. http://dx.doi.org/10.2478/pce-2022-0014.

Full text
Abstract:
Abstract The article deals with cyber incidents that were recorded in the area of the V4 countries. It is important for the discussed topic to extract certain factors and with their help to characterise the conducted cyberattacks in terms of political motivations. The analysis tries to prove the existence of politically motivated cyberattacks. This, in turn, helps to determine the consequences of such cyber incidents. Moreover, the scale and magnitude of the cyberattack can be information to determine the strategic maturity and cyber capabilities of the adversary. Thus, the incidents that have
APA, Harvard, Vancouver, ISO, and other styles
36

KOPYLOV, ALEXANDER V., ALEXANDER G. LIKHONOSOV, and NIKOLAY A. CHICHULIN. "SOME UNITED STATES OF AMERICA APPROACHES TO CYBER DETERRENCE." Sociopolitical Sciences 14, no. 5 (2024): 15–23. https://doi.org/10.33693/2223-0092-2024-14-5-15-23.

Full text
Abstract:
The intensive development of information and communication technologies and the digitalization of all spheres of public life create not only conditions for the progressive development of mankind but are also accompanied by the emergence of new threats in cybernetic space. In the context of unprecedented scientific and technological progress, information flows are rapidly growing, while the number of malicious cyber-attacks on the information infrastructure of countries is increasing. To prevent and combat cyber threats, some States turn to the theory and practice of the concept of deterrence.
APA, Harvard, Vancouver, ISO, and other styles
37

Hendriawan, Arizal, Idris Gautama, Denny Siahaan, and Kurniawan Kurniawan. "Analysis of The Influence of Factors on Maritime Cyber Resilience on Board With Intervening Maritime Cyber Security Awareness." Syntax Literate ; Jurnal Ilmiah Indonesia 10, no. 3 (2025): 2783–94. https://doi.org/10.36418/syntax-literate.v10i3.56311.

Full text
Abstract:
Indonesia plays a crucial role in sustaining the global maritime industry, with its growing potential to supply a skilled workforce through improved maritime education and international certifications. However, cybersecurity has become a critical challenge, with rising cyberattacks causing financial losses, operational disruptions, and diminished trust among stakeholders. Limited digital literacy, outdated technology, and inadequate cyber threat training exacerbate vulnerabilities, threatening maritime operations, national security, and economic stability. This study evaluates maritime cyberse
APA, Harvard, Vancouver, ISO, and other styles
38

Onuh, Ojoh. "A Comparative Analysis of the Influence of Artificial Intelligence Tools in Cybersecurity." International Journal of Recent Research in Mathematics Computer Science and Information Technology 11, no. 2 (2025): 32–52. https://doi.org/10.5281/zenodo.14620636.

Full text
Abstract:
<strong>Abstract:</strong> This study explores the critical role of artificial intelligence (AI) tools in enhancing cybersecurity operations compared to conventional methods. With the rising sophistication of cyber-attacks and attackers, traditional security tools are becoming less effective. The research evaluates AI-powered tools' effectiveness in detecting and mitigating breaches across various cybersecurity domains, assessing their impact on both attack and defense strategies. The findings show that AI-powered tools significantly improve threat detection and response times, with key metric
APA, Harvard, Vancouver, ISO, and other styles
39

Sunhurova, Salome. "INTERNATIONAL EXPERIENCE OF STRUGGLING WITH THE POLITICAL VIOLENCE BY MEANS OF INFORMATION WARFARE." Politology bulletin, no. 88 (2022): 202–18. http://dx.doi.org/10.17721/2415-881x.2022.88.202-218.

Full text
Abstract:
The goal of the work is to study the international experience of democratic countries in countering threats in the information and digital space, which involves repelling cyber-attacks and information operations, as well as counteroffensive actions in order to preserve Western democratic values, institutions and systems. The article examines the international experience of resisting political violence in the information space, which confirms the existence of a common enemy of the democratic world, the Russian Federation, in the information struggle. It has been demonstrated that the Russian ap
APA, Harvard, Vancouver, ISO, and other styles
40

Kalogiannidis, Stavros, Maria Paschalidou, Dimitrios Kalfas, and Fotios Chatzitheodoridis. "Relationship between Cyber Security and Civil Protection in the Greek Reality." Applied Sciences 13, no. 4 (2023): 2607. http://dx.doi.org/10.3390/app13042607.

Full text
Abstract:
The links between cybersecurity and civil protection in the last decades became strong due to the rapid increase in the use of Informatics Technologies (IT) worldwide and the need to increase citizens’ protection from various disasters and uncertainties. The objective of the present study is to explore the role of cyber security in enhancing civil protection in Greek reality. Methodologically, the study has been based on a survey with a sample of 345 executives of IT companies in Greece by using a structured questionnaire. The basic results of the research study showed that cyber security tech
APA, Harvard, Vancouver, ISO, and other styles
41

Katerynchuk, Pavlo. "Protection of Cyberspace as a Component of Ukraine’s Information Security." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 57–70. http://dx.doi.org/10.31861/mediaforum.2018.6.57-70.

Full text
Abstract:
Cyber security and cyber space of Ukraine remained for a long time out of the attention of domestic researchers and, therefore, civil servants. For more than 20 years, the young Ukrainian state did not waste its efforts on the formation of not only effective and reliable troops, but also information security. The government did not endeavored to strengthen the country’s defense, and only weakened its lack of progress in fighting corruption and the dominance of Russian media and intelligence. As a result, in the spring of 2014, after a long confrontation between the regime of Viktor Yanukovych
APA, Harvard, Vancouver, ISO, and other styles
42

Pavel, Tal. "The Iranian Cyberattacks in Albania: Actors, Tactics, Targets." dot.pl, no. I (December 3, 2024): 105–23. https://doi.org/10.60097/dotpl/196772.

Full text
Abstract:
Objective – The paper analyses the Iranian cyber-attacks in Albania, a small but strategically important nation in the Balkans. It examines the cyber incidents attributed to Iranian actors, highlighting the tactics employed, targeted sectors, and the objectives behind these operations. As geopolitical tensions between Iran and Albania have escalated in recent years, mainly due to Albania's support for an Iranian dissident group, Tehran has increasingly resorted to cyber warfare as a tool of influence and retaliation. By assessing the effectiveness of these cyber campaigns and their implication
APA, Harvard, Vancouver, ISO, and other styles
43

Raska, Michael. "North Korea’s Evolving Cyber Strategies: Continuity and Change." SIRIUS – Zeitschrift für Strategische Analysen 4, no. 2 (2020): 1–13. http://dx.doi.org/10.1515/sirius-2020-3030.

Full text
Abstract:
AbstractPyongyang sees the Korean Peninsula as entrenched in a geopolitical deadlock among great powers, with the United States continuing to employ what the North Korean regime sees as a “hostile policy” detrimental to its survival, its ability to shape relevant events, and the country’s political and economic development. While the core security concerns of South Korea and the United States are North Korea’s growing nuclear weapons and ballistic missile capabilities, the alliance must increasingly also prioritize the continuous development of North Korea’s cyber capabilities, both offensive
APA, Harvard, Vancouver, ISO, and other styles
44

BELCIU (VASILESCU), Alina-Camelia, and Marius PREDA. "Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors." International Journal of Information Security and Cybercrime 13, no. 2 (2024): 18–32. https://doi.org/10.19107/ijisc.2024.02.02.

Full text
Abstract:
The increasing frequency, severity, and complexity of cyber-attacks at EU level highlights the significant importance of robust cyber security frameworks. This article examines the role of EU regulations, in particular the Directive on measures for a high common level of cybersecurity across the Union (NIS 2 Directive) and the Cyber Resilience Act (CRA), in strengthening cyber resilience in critical sectors. First, the review of EU regulations was carried out through a comparative analysis of the legislative documents to highlight objectives, targeted entities, security measures, and complianc
APA, Harvard, Vancouver, ISO, and other styles
45

Ncubukezi, Tabisa. "Determination of the end device risk likelihood using the Bayesian network tools." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 319–31. http://dx.doi.org/10.34190/eccws.22.1.1184.

Full text
Abstract:
All institutions use end devices for information processing which includes sending and receiving on the network. This process helps them to improve their business production as well as perform daily activities at a faster rate. However, the increased usage of end devices by both employees and criminals raises concerns and exposes businesses to a range of cyber risks. End devices can sometimes be used as agents and weapons to expose internal business operations. The vulnerability of the end devices to cyber threats and attacks compromises business data, its safety, and security. This paper dete
APA, Harvard, Vancouver, ISO, and other styles
46

Krasznay, Csaba. "Hacktivists, Proxy Groups, Cyber Volunteers." Academic and Applied Research in Military and Public Management Science 23, no. 3 (2024): 107–24. https://doi.org/10.32565/aarms.2024.3.6.

Full text
Abstract:
This paper explores the involvement of hacktivists, cyber volunteers and proxy groups in military cyber operations, with a particular focus on their roles in the ongoing Russian–Ukrainian war. The research aims to analyse the participation of these non-state actors, their legal implications, and how their involvement could influence the strategic, operational and tactical practices of small and medium-sized NATO member states, such as Hungary. Drawing from case studies, literature review and in-depth interviews with Hungarian military intelligence and public administration leaders, the paper f
APA, Harvard, Vancouver, ISO, and other styles
47

MANANTAN, MARK BRYAN. "The People’s Republic of China’s Cyber Coercion: Taiwan, Hong Kong, and the South China Sea." Issues & Studies 56, no. 03 (2020): 2040013. http://dx.doi.org/10.1142/s1013251120400135.

Full text
Abstract:
This paper investigates the increasing use of cyber coercion by the People’s Republic of China (PRC) among its core interests: Taiwan, Hong Kong, and the South China Sea. It argues that the PRC’s deployment of sophisticated attacks in the form of cyber coercion continues to be part of its geostrategic playbook to exert its influence and prosecute its wider interests as a rising power in the Indo-Pacific region. However, it observes that cyber coercion will be employed by the PRC in concert with all the other tools — diplomatic, economic, and the political — across the spectrum. The paper has t
APA, Harvard, Vancouver, ISO, and other styles
48

Huskaj, Gazmend, Fredrik Blix, and Stefan Axelsson. "A Theory of Offensive Cyberspace Operations and Its Policy and Strategy Implications." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 214–23. http://dx.doi.org/10.34190/eccws.23.1.2391.

Full text
Abstract:
The significance of Offensive Cyberspace Operations (OCO) in cyber warfare and national security is increasingly recognised, yet academic literature lacks a dedicated theoretical framework to fully articulate its unique aspects and strategic dimensions. Traditionally enveloped within the broader context of information warfare, OCO's distinct characteristics have often been overlooked. Addressing this gap, our paper aims to delineate the specificities of OCO and establish a structured conceptual model that enhances understanding and operational clarity. To achieve this, the study adopts an inte
APA, Harvard, Vancouver, ISO, and other styles
49

Semenov, Boris Romanovich. "The role of digital technologies in US information operations in the post-Soviet space." Мировая политика, no. 1 (January 2025): 37–47. https://doi.org/10.25136/2409-8671.2025.1.73553.

Full text
Abstract:
This article examines the importance and role of digital technologies in conducting information operations (IO) by the United States of America in the post-Soviet space. The research includes an analysis of the theoretical foundations of information operations, their place and importance in modern geopolitics, as well as their impact on international relations. Special attention is paid to the methods of information operations, including disinformation, targeted cyber attacks, manipulation of public opinion through social networks, media resources and artificial intelligence technologies. The
APA, Harvard, Vancouver, ISO, and other styles
50

Sabeeruddin, shaik. "The Growing Role of Security Orchestration, Automation and Response (SOAR) in SOC Operations." International Journal of Leading Research Publication 5, no. 12 (2024): 1–6. https://doi.org/10.5281/zenodo.14769600.

Full text
Abstract:
The increasing complexity of cyber threats demands advanced solutions for Security Operations Centers (SOCs). Security Orchestration, Automation, and Response (SOAR) has emerged as a crucial technology for enhancing SOC operations by integrating diverse security tools, automating repetitive tasks, and optimizing incident response workflows. This paper investigates the expanding role of SOAR in SOCs, emphasizing its advantages, applications, and influence on cybersecurity efficacy. By examining the challenges encountered by SOCs and how SOAR mitigates these issues, this research highlights the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!