Journal of Law & Cyber Warfare Vol. 4:3 Winter 2015


Book Description

The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war.




The Virtual Weapon and International Order


Book Description

An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order The cyber revolution is the revolution of our time. The rapid expansion of cyberspace brings both promise and peril. It promotes new modes of political interaction, but it also disrupts interstate dealings and empowers non-state actors who may instigate diplomatic and military crises. Despite significant experience with cyber phenomena, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy. Kello draws on a broad range of case studies, including the Estonian crisis, the Olympic Games operation against Iran, and the cyber attack against Sony Pictures. Synthesizing qualitative data from government documents, forensic reports of major incidents and interviews with senior officials from around the globe, this important work establishes new conceptual benchmarks to help security experts adapt strategy and policy to the unprecedented challenges of our times.




Volume 7, Issue 1, Winter 2019


Book Description







Volume 6 Winter 2018 Issue 2


Book Description

Foreword Resilience, Perseverance and Fortitude: Lessons from My Parents Rhea Siers Articles Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community David Wallace & Mark Visger Does the Cryptographic Hashing of Passwords Qualify for Statutory Breach Notification Safe Harbor? Jason R. Wool ÒPlaying With FireÓ An Inter-Agency Working Group Proposal for Connected Vehicle Technology and the DSRC Mandate Christopher Kolezynski Briefings The Ransomware Assault on the Healthcare Sector Malcolm Harkins & Anthony M. Freed German IT Security Law John A. Foulks




Leading Issues in Cyber Warfare and Security


Book Description

Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence of such stories reveals an overwhelming weakness in the security of the systems we increasingly rely on for everything: shopping, banking, health services, education, and even voting. That these problems persist even as the world rushes headlong into the Internet-of-Things and cloud based everything underscores the importance of understanding the current and potential aspects of information warfare, also known as cyberwarfare. Having passed through into the third generation of information warfare, we now must consider what the fourth generation might look like. Where we are now is not unlike trench warfare, only in cyberspace. Where we go next will emerge in an international landscape that is considering the implications of current capabilities on notions of just warfare, sovereignty, and individual freedoms. The papers in this book have been selected to provide the reader with a broad appreciation for the challenges that accompany the evolution of the use of information, information technologies, and connectedness in all things. The papers are important contributions, representing 8 different countries or regions, that create a truly global thought presentation.




Cyberwarfare


Book Description

This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).




Consumer Protection, Automated Shopping Platforms and EU Law


Book Description

This book looks at two technological advancements in the area of e-commerce, which dramatically seem to change the way consumers shop online. In particular, they automate certain crucial tasks inherent in the ‘shopping’ activity, thereby relieving consumers of having to perform them. These are shopping agents (or comparison tools) and automated marketplaces. It scrutinizes their underlying processes and the way they serve the consumer, thereby highlighting risks and issues associated with their use. The ultimate aim is to ascertain whether the current EU regulatory framework relating to consumer protection, e-commerce, data protection and security adequately addresses the relevant risks and issues, thus affording a ‘safe’ shopping environment to the e-consumer.




Intelligence in Vex


Book Description

Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.




Construction 4.0


Book Description

Modelled on the concept of Industry 4.0, the idea of Construction 4.0 is based on a confluence of trends and technologies that promise to reshape the way built environment assets are designed, constructed, and operated. With the pervasive use of Building Information Modelling (BIM), lean principles, digital technologies, and offsite construction, the industry is at the cusp of this transformation. The critical challenge is the fragmented state of teaching, research, and professional practice in the built environment sector. This handbook aims to overcome this fragmentation by describing Construction 4.0 in the context of its current state, emerging trends and technologies, and the people and process issues that surround the coming transformation. Construction 4.0 is a framework that is a confluence and convergence of the following broad themes discussed in this book: Industrial production (prefabrication, 3D printing and assembly, offsite manufacture) Cyber-physical systems (actuators, sensors, IoT, robots, cobots, drones) Digital and computing technologies (BIM, video and laser scanning, AI and cloud computing, big data and data analytics, reality capture, Blockchain, simulation, augmented reality, data standards and interoperability, and vertical and horizontal integration) The aim of this handbook is to describe the Construction 4.0 framework and consequently highlight the resultant processes and practices that allow us to plan, design, deliver, and operate built environment assets more effectively and efficiently by focusing on the physical-to-digital transformation and then digital-to-physical transformation. This book is essential reading for all built environment and AEC stakeholders who need to get to grips with the technological transformations currently shaping their industry, research, and teaching.