Academic literature on the topic 'Cyborg theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyborg theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyborg theory"

1

Dos Santos, Victoria, and Humberto Valdivieso. "The Contemporary Cyborg." Techné: Research in Philosophy and Technology 25, no. 2 (2021): 195–207. http://dx.doi.org/10.5840/techne202167141.

Full text
Abstract:
The aim of this article is to study and explore the cyborg as a metaphoric figure, as well as its semiotic correlation with the contemporary subject, an entity moving through a society developed by digital technologies. The cyborg paradigm is formed by the unification of existing dichotomies between human-machine, nature-culture, and science-magic, disrupting transcendental dualisms and fixed categories. These phenomena can be understood through the concept of intertextuality developed first by Julia Kristeva and then by Roland Barthes, both using the cyborg body as a textual construction, and
APA, Harvard, Vancouver, ISO, and other styles
2

Viljanen, Mika. "A Cyborg Turn in Law?" German Law Journal 18, no. 5 (2017): 1277–308. http://dx.doi.org/10.1017/s2071832200022331.

Full text
Abstract:
This Article deploys cybernetic theory to argue that a novel legal impact imaginary has emerged. In this imaginary, the subjects of legal interventions are performed and enacted as cybernetic organisms, that is, as entities that process information and adapt to changes in their environment. This Article, then, argues that in this imaginary, law finds its effectiveness—not by threatening, cajoling, educating, and moralizing humans as before, but by affecting the composition of cybernetic organisms, giving rise to new kinds of legal subjects that transcend the former conceptual boundary between
APA, Harvard, Vancouver, ISO, and other styles
3

Cox, Lara. "Decolonial Queer Feminism in Donna Haraway's ‘A Cyborg Manifesto’ (1985)." Paragraph 41, no. 3 (2018): 317–32. http://dx.doi.org/10.3366/para.2018.0274.

Full text
Abstract:
This article explores the queer qualities of feminist scientist Donna Haraway's ‘A Cyborg Manifesto’ (1985). In the first part, the article investigates the similarities between ‘A Cyborg Manifesto’ and the ideas circulating in queer theory, including the hybridity of identity, and the disruption of totalizing social categories such as ‘Gay man’ and ‘Woman’. In the second part, it is argued that ‘A Cyborg Manifesto’ evinced a decolonial feminist form of queerness. The article references the African-American, Chicana and Asian-American feminist sociology, theory, literature and history that ‘A
APA, Harvard, Vancouver, ISO, and other styles
4

Torres-Hostench, Olga. "Will translators be cyborgs? What would make a cyborg translator?" Tradumàtica: tecnologies de la traducció, no. 20 (December 21, 2022): 268–75. http://dx.doi.org/10.5565/rev/tradumatica.316.

Full text
Abstract:
Previous literature on cyborg translators focus mainly on machine translation as the ultimate science fiction. In 2022 it is relevant to talk about cyborg translators beyond just machine translation to picture new challenges. The aim of this article is to invite the readers to reflect on the subject.
APA, Harvard, Vancouver, ISO, and other styles
5

Browne, Kath. "Cyborg uterine geographies." Dialogues in Human Geography 8, no. 3 (2018): 317–19. http://dx.doi.org/10.1177/2043820618800601.

Full text
Abstract:
This short commentary responds to the article by Sophie Lewis. It focuses on the sanitized body of/within geography; determinacy; the challenge of the collective in creating restrictions; the focus on `normal' aspects and then it offers a challenge to consider how in doing uterine geographies we might create new knowledge through engagements that reflect the theory.
APA, Harvard, Vancouver, ISO, and other styles
6

Mehaffy, Marilyn Maness. "Fetal attractions: The limit of Cyborg theory." Women's Studies 29, no. 2 (2000): 177–94. http://dx.doi.org/10.1080/00497878.2000.9979307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Obolkina, Svetlana. "Cyborg in the “mirror” of philosophical reflection (using the example of the game “Cyberpunk 2077”)." Chelovek 33, no. 1 (2022): 122. http://dx.doi.org/10.31857/s023620070019078-2.

Full text
Abstract:
The cyborg is the most important futurological character, and its analysis is the purpose of this article. In order for the understanding of the Cyborg not to be limited to the idea of the complementation of man and machine, philosophical reflection is required. Methodological basis of the research: the method of topological reflection allows analyzing works of mass art as the “subconscious” of culture. The author analyzes the topos and the Cyborg concept, comparing them. The article considers the computer game “Cyberpunk 2077” as a Cyborg topos. The concept of the cyborg is analyzed mainly on
APA, Harvard, Vancouver, ISO, and other styles
8

Chang,Jung-Hee. "Feminism in the Age of Technoscience and Cyborg Theory." Feminist Studies in English Literature 17, no. 1 (2009): 269–95. http://dx.doi.org/10.15796/fsel.2009.17.1.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sey, J. "The terminator syndrome: Science fiction, cinema and contemporary culture." Literator 13, no. 3 (1992): 13–20. http://dx.doi.org/10.4102/lit.v13i3.760.

Full text
Abstract:
This paper examines the impact of contemporary technology on representations of the human body in American popular culture, focusing on James Cameron’s science fiction films The Terminator (1984) and The Terminator II - Judgment Day (1991) in both of which the key figures are cybernetic organisms (cyborgs) or a robot which can exactly imitate the human form . The paper argues that the ability of modern film technology’ to represent the human form in robotic guise undercuts the distinction between nature and culture which maintains the position of the human being in society. The ability of the
APA, Harvard, Vancouver, ISO, and other styles
10

N, Uma Maheswari. "The Eleventh-Dimensional Fish Man from the Short Story Lion's Tail." International Research Journal of Tamil 4, S-7 (2022): 335–43. http://dx.doi.org/10.34256/irjt22s753.

Full text
Abstract:
Dr. C.S. Lakshmi uses the pen name Ambai for publishing Tamil fiction. Ambai, a Sahitya Akademi Award winner in 2021, has written works with feminist themes. A skilled short story writer. It is only possible for a few writers to mix science and novel short stories. Embedding modern scientific theories in the short story, Ambay has created a short story called "Lion's Tail" without compromising his literary taste. This short story gives an understanding of the eleventh dimension related to physics theories such as the Theory of Everything, M Theory, and String Theory. Are we still alive after t
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyborg theory"

1

Merrick, Katherine Anna. "The cyborg is the message a monstrous perspective for communication theory /." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Craveiro, António Manuel Balazeiro Cascão. "O hipercorpo-tecnologias da carne : do culturista ao cyborg." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2000. http://dited.bn.pt:80/29212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bilgen, Funda. "An Ecofeminist Approach To Atwood&amp." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12610246/index.pdf.

Full text
Abstract:
This thesis analyzes the analogy between woman and nature and ecofeminist theory that emphasizes the parallelism between man&#039<br>s exploitation of woman and nature. It aims to make an ecofeminist analysis of three novels: Surfacing by Margaret Atwood, The Cleft by Doris Lessing and The Stone Gods by Jeanette Winterson. First, this thesis introduces the history and main principles of ecofeminist theory. These novels by different women writers investigate the embodiment of these main principles in three novels despite the fact that the same aspects of the theory can sometimes be interpreted
APA, Harvard, Vancouver, ISO, and other styles
4

Blaeuer, Daniel Matthew. "An Ecology of Performance: Gregory Bateson's Cybernetic Performance." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3510.

Full text
Abstract:
This dissertation is a case study of the public performances of Gregory Bateson at The Esalen Institute. The case study is a reconsideration of the work of Gregory Bateson from the perspective of performance studies. The author brings together performativity, cybernetics, and the sacred to argue that Gregory Bateson, in his public performances, was striving for grace in encounters with others. The author has conducted archival research into Bateson’s presentations and has spoken with several close to Bateson to get a sense of how his process of public presentation paralleled his ideas—a proces
APA, Harvard, Vancouver, ISO, and other styles
5

Van, der Schyff Karlien. "Screen bound/skin bound : the politics of embodiment in the posthuman age." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/4139.

Full text
Abstract:
Thesis (MA (English))--University of Stellenbosch, 2010.<br>ENGLISH ABSTRACT: The end of the second millennium saw a sudden return to corporeality, especially within feminist scholarship, where embodiment and issues surrounding the body were, for the first time, made explicit. This study examines the corporeal body in relation to technology and the impact that newly emerging virtual technologies have on our understanding of the body, not only through examining representations of the technologically modified body, but also by exploring how contemporary cultural practices produce corporeal
APA, Harvard, Vancouver, ISO, and other styles
6

Villafana, Johans. "Att (re) –introducera hybrida tankar i ett bilsamhälle : En studie av förbindelsen bil-männniska cyborgen med hjälp av Actor Network Theory." Thesis, Stockholms universitet, Kulturgeografiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-90827.

Full text
Abstract:
Denna studie belyser behovet av alternativa synsätt och alternativa lösningar på hur bilismen och transportsektorn medverkar till miljöproblemen i samhället. Studien undersöker bilens roll för bilisten genom att lyfta fram förbindelsen bil-människa och hur denna förbindelse påverkar valet mellan bilen och kollektiva färdsätt i tre bostadsområden i Stockholmsregion. För att nå förståelse för förbindelsen bil-människa utgår studien från ett aktör-nätverksperspektiv. Metoden utgår från dels kvalitativa intervjuer och litteraturstudier. Under studiens gång uppstod ny förståelse för förbindelsen bi
APA, Harvard, Vancouver, ISO, and other styles
7

Swift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16439/1/Adam_Swift_Thesis.pdf.

Full text
Abstract:
The discourse that surrounds and constitutes the post-human emerged as a response to earlier claims of an essential or universal human or human nature. These discussions claim that the human is a discursive construct that emerges from various configurations of nature, embodiment, technology, and culture, configurations that have also been variously shaped by the forces of social history. And in the absence of an essential human figure, post-human discourses suggest that there are no restrictions or limitations on how the human can be reconfigured. This axiom has been extended in light of a ple
APA, Harvard, Vancouver, ISO, and other styles
8

Swift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16439/.

Full text
Abstract:
The discourse that surrounds and constitutes the post-human emerged as a response to earlier claims of an essential or universal human or human nature. These discussions claim that the human is a discursive construct that emerges from various configurations of nature, embodiment, technology, and culture, configurations that have also been variously shaped by the forces of social history. And in the absence of an essential human figure, post-human discourses suggest that there are no restrictions or limitations on how the human can be reconfigured. This axiom has been extended in light of a ple
APA, Harvard, Vancouver, ISO, and other styles
9

Bolich, Cecilia Madeline. "_Alien_ Thoughts: Spectatorial Pleasure and Mind Reading in Ridley Scott's Horror Film." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/3012.

Full text
Abstract:
Pleasure experienced in an unpleasant film genre, like horror, has prompted numerous discussions in film studies. Noted scholars like Carol J. Clover and Noël Carroll have rationalized spectatorial enjoyment of a genre that capitalizes on human anxieties and complicates cultural categories. Clover admits that horror initially satisfies sadistic tendencies in young male viewers but then pushes them to cross gender lines and identify with the strong female heroine who defeats the film's threat. Carroll provides a basic explanation, citing spectators' cognitive curiosity as the source of pleasure
APA, Harvard, Vancouver, ISO, and other styles
10

Alphin, Caroline Grey. "Living on the Edge of Burnout: Defamiliarizing Neoliberalism Through Cyberpunk Science Fiction." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/88796.

Full text
Abstract:
A dominant trend in cyberpunk scholarship draws from Fredric Jameson's diagnosis of postmodernism as the logic of late capitalism, using Jameson's spatial pastiche, schizophrenic temporality, and waning of affect, along with Jameson's characterization of Baudrillard's simulacrum to interpret postmodern cultural artifacts. For many cultural critics, the city of cyberpunk is thoroughly postmodern because parallels can be drawn between the cyberpunk city and the postmodern condition. However, very little work has considered the ways in which cyberpunk can defamiliarize the necro-spatial and nec
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyborg theory"

1

Technologies of the gendered body: Reading cyborg women. Duke University Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brown, J. Andrew. Cyborgs in Latin America. Springer Nature, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pawlick, Jeffrey, and Quanyan Zhu. Game Theory for Cyber Deception. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66065-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jenny, Wolmark, ed. Cybersexualities: A reader on feminist theory, cyborgs, and cyberspace. Edinburgh University Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Peng, Sushil Jajodia, and Cliff Wang, eds. Theory and Models for Cyber Situation Awareness. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61152-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

On spiders, cyborgs, and being scared: The feminine and the sublime. Manchester University Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cyborgs in Latin America. Palgrave Macmillan, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

The souls of cyberfolk: Posthumanism as vernacular theory. University of Minnesota Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cavallaro, Lorenzo, and Dieter Gollmann, eds. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38530-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cyber terrorism: Political and economic implications. Idea Group Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyborg theory"

1

Short, Sue. "Body and Soul: A History of Cyborg Theory." In Cyborg Cinema and Contemporary Subjectivity. Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230513501_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goodman, Robin Truth. "Baghdad Burning: Cyborg Meets the Negative." In Feminist Theory in Pursuit of the Public. Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230112957_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Puar, Jasbir K. "“I Would Rather be a Cyborg than a Goddess”." In Feminist Theory Reader. Routledge, 2020. http://dx.doi.org/10.4324/9781003001201-47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Earle, Joshua. "Cyborg Maintenance: Design, Breakdown, and Inclusion." In Design, User Experience, and Usability. Design Philosophy and Theory. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23570-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lupton, Deborah. "Donna Haraway: The Digital Cyborg Assemblage and the New Digital Health Technologies." In The Palgrave Handbook of Social Theory in Health, Illness and Medicine. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137355621_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fielder, Andrew. "Game Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ruth, David M. "Probability Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Russell, Travis B. "Quantum Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cocke, William, and Meng-Che ‘Turbo’ Ho. "Group Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lauderdale, Lindsey-Kay. "Ring Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyborg theory"

1

Wu, Zhen, Guoyuan Liang, Jiao Ren, Fan Chen, Likai Zhou, and Xinyu Wu. "Nonuniform Illumination Image Segmentation Based on Improved Homomorphic Filtering and Class Uncertainty Theory." In 2018 IEEE International Conference on Cyborg and Bionic Systems (CBS). IEEE, 2018. http://dx.doi.org/10.1109/cbs.2018.8612180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reissman, Timothy, and Ephrahim Garcia. "Surgically Implanted Energy Harvesting Devices for Renewable Power Sources in Insect Cyborgs." In ASME 2008 International Mechanical Engineering Congress and Exposition. ASMEDC, 2008. http://dx.doi.org/10.1115/imece2008-68136.

Full text
Abstract:
This work details the implantation process of an energy harvester platform within a Manduca sexta Hawkmoth for the purpose of creating a cyborg insect. Also included is an evaluation of energy harvesting with respect to present lightweight battery technology and the magnitudes of ambient energy available for the cyborg insect application. Specific emphasis is given to kinetic energy harvester development, with theory and fabrication of the devices detailed.
APA, Harvard, Vancouver, ISO, and other styles
3

Peng, Ling-Xi, and Tian-Wei Chen. "Automated Intrusion Response System Algorithm with Danger Theory." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guellati, Souad, Ilham Kitouni, Riadh Matmat, and Djamel Eddine Saidouni. "Forward Analysis of Timed Automata with Action Durations: Theory and Implementation." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huang, Haihui, Jing Cai, and Shaoci Xie. "Implementing an Asset Trading System Based on Blockchain and Game Theory." In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Quanyan. "Game theory for cyber deception." In the 6th Annual Symposium. ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhuang, Rui, Alexandru G. Bardas, Scott A. DeLoach, and Xinming Ou. "A Theory of Cyber Attacks." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. ACM, 2015. http://dx.doi.org/10.1145/2808475.2808478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dawood, Harith A. "Graph Theory and Cyber Security." In 2014 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2014. http://dx.doi.org/10.1109/acsat.2014.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shiva, Sajjan, Sankardas Roy, and Dipankar Dasgupta. "Game theory for cyber security." In the Sixth Annual Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Gang, Yinhui Yang, Qinhua Ren, and Runnian Ma. "Efficiency of Command and Control in Cyberspace: Visit from the Perspective of Complexity Theory." In 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2013. http://dx.doi.org/10.1109/cyberc.2013.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyborg theory"

1

Bier, Asmeret Brooke. A cognitive and economic decision theory for examining cyber defense strategies. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1147206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lohn, Andrew, and Krystal Jackson. Will AI Make Cyber Swords or Shields? Center for Security and Emerging Technology, 2022. http://dx.doi.org/10.51593/2022ca002.

Full text
Abstract:
Funding and priorities for technology development today determine the terrain for digital battles tomorrow, and they provide the arsenals for both attackers and defenders. Unfortunately, researchers and strategists disagree on which technologies will ultimately be most beneficial and which cause more harm than good. This report provides three examples showing that, while the future of technology is impossible to predict with certainty, there is enough empirical data and mathematical theory to have these debates with more rigor.
APA, Harvard, Vancouver, ISO, and other styles
3

Letchford, Joshua. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1330190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nucera, Diana J., and Catalina Vallejo. Media-making Pedagogies for Empowerment & Social Change: An Interview with Diana J. Nucera (AKA Mother Cyborg). Just Tech, Social Science Research Council, 2022. http://dx.doi.org/10.35650/jt.3022.d.2022.

Full text
Abstract:
" As part of our “What Is Just Tech?” series, we invited several social researchers–scholars, practitioners, artists, and activists—to respond to a simple yet fundamental question: “What is just technology?” This interview was conducted by Just Tech program officer Catalina Vallejo, who spoke with Diana J. Nucera, AKA Mother Cyborg, a multimedia artist, educator, and organizer based in Detroit, Michigan. Nucera (she/her) uses music, performance, DIY publishing, community-organizing tactics, and popular education methods to elevate collective technological consciousness and agency. Her art draw
APA, Harvard, Vancouver, ISO, and other styles
5

Goode, Kayla, Ali Crawford, and Christopher Back. U.S. High School Cybersecurity Competitions: Building Cyber Talent Through Extracurricular Activities. Center for Security and Emerging Technology, 2022. http://dx.doi.org/10.51593/2021ca012.

Full text
Abstract:
In the current cyber-threat environment, a well-educated workforce is critical to U.S. national security. Today, however, nearly six hundred thousand cybersecurity positions remain unfilled across the public and private sectors. This report explores high school cybersecurity competitions as a potential avenue for increasing the domestic cyber talent pipeline. The authors examine the competitions, their reach, and their impact on students’ educational and professional development.
APA, Harvard, Vancouver, ISO, and other styles
6

Belcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2113.

Full text
Abstract:
Public transit agencies in the United States depend on external vendors to help deliver and maintain many essential services and to provide critical technologies, from ticket purchases to scheduling to email management. While the integration of new, advanced technologies into the public transit industry brings important advancements to U.S. critical transportation infrastructure, the application of digital technologies also brings with it a new assortment of digital risks. Transit agencies of all sizes are finding themselves subject to cyber incidents—most notably ransomware attacks—like those
APA, Harvard, Vancouver, ISO, and other styles
7

Hoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2021ca007.

Full text
Abstract:
Artificial intelligence will play an increasingly important role in cyber defense, but vulnerabilities in AI systems call into question their reliability in the face of evolving offensive campaigns. Because securing AI systems can require trade-offs based on the types of threats, defenders are often caught in a constant balancing act. This report explores the challenges in AI security and their implications for deploying AI-enabled cyber defenses at scale.
APA, Harvard, Vancouver, ISO, and other styles
8

Carty, Anthony, and Jing Gu. Theory and Practice in China’s Approaches to Multilateralism and Critical Reflections on the Western ‘Rules-Based International Order’. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/ids.2021.057.

Full text
Abstract:
China is the subject of Western criticism for its supposed disregard of the rules-based international order. Such a charge implies that China is unilateralist. The aim in this study is to explain how China does in fact have a multilateral approach to international relations. China’s core idea of a community of shared future of humanity shows that it is aware of the need for a universal foundation for world order. The Research Report focuses on explaining the Chinese approach to multilateralism from its own internal perspective, with Chinese philosophy and history shaping its view of the nature
APA, Harvard, Vancouver, ISO, and other styles
9

Buchanan, Ben, John Bansemer, Dakota Cary, Jack Lucas, and Micah Musser. Automating Cyber Attacks: Hype and Reality. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca002.

Full text
Abstract:
Based on an in-depth analysis of artificial intelligence and machine learning systems, the authors consider the future of applying such systems to cyber attacks, and what strategies attackers are likely or less likely to use. As nuanced, complex, and overhyped as machine learning is, they argue, it remains too important to ignore.
APA, Harvard, Vancouver, ISO, and other styles
10

Martinez, Cindy, and Micah Musser. U.S. Demand for Talent at the Intersection of AI and Cybersecurity. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca009.

Full text
Abstract:
As demand for cybersecurity experts in the United States has grown faster than the supply of qualified workers, some organizations have turned to artificial intelligence to bolster their overwhelmed cyber teams. Organizations may opt for distinct teams that specialize exclusively in AI or cybersecurity, but there is a benefit to having employees with overlapping experience in both domains. This data brief analyzes hiring demand for individuals with a combination of AI and cybersecurity skills.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!