Articles

Analysis of cyber nuclear terrorism by DTrack consequences in the civilian nuclear power plant

It is investigated for the nuclear security following the cyber terrorism of the Kudankulam nuclear power plant (KNPP) in Tamil Nadu, India. The relationship between arbitrary data and the invasion scenario is analyzed by the designed algorithms. In the study, the system dynamics (SD) can be used fo...

Unpacking Urban (Dis)Continuities of Postwar Violence

Which cities become arenas for violent contestation after war? A growing literature has documented how conflict-related vio lence often continues after the formal end of armed conflict, and also that such violence often is particularly prevalent in urban areas. Such urban unrest cannot simply be...

Cyber What???-a Systematic Review

Cybersecurity is a critical concern in contemporary digital environments, especially within the context of complex, interconnected systems. This study presents a systematic review of the complexities and inconsistencies surrounding the use of cyber-related terminology. A two-phased approach. The fir...

Reading Jewish and Muslim women: Literature and/as interfaith Work

In contemporary Britain, Muslims and Jews are polarised. A book group, however, serves as a fruitful intermediary. In this article, I examine the dynamics of a Jewish-Muslim women’s book group. Reading Jewish and Muslim women’s writing, participants centred their gendered subject positions ...

Gender, violence and cultures of silence: young women and paramilitary violence

ABSTRACT Despite a growth in analysis of women and conflict, this has tended to overlook the specific experiences of young women. Likewise, in research on youth, conflict and peace, the term ‘youth’ is often short-hand for young men. Young women’s experiences are regularly absent from re...

Cyber-attacks and the right of self-defense: a case study of the Netherlands

Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on selfdefense and contribute to the jus ad bel...

Like ticking time bombs. Improvising structural competency to ‘Defuse’ the exploding of violence against emergency care workers in Italy

ABSTRACT Whileviolenceagainsthealthcareworkersisbeingprogressivelyrecognised as a serious problem in the healthcare industry, it remains an under-studied area of enquiry in global public health. Anthropologists have long observed thatviolencetowardpatientsistiedtoinstitutionalcarepractises in m...

The hidden threat of cyber-attacks – undermining public confidence in government

This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical destruction - but rather more insidious societal risks such as reduced trust in government. To test this claim, we collect and analyze survey data in the immediate aftermath of a ransomware attack against a ...

Lesson from rote’s palm tree to unlock the global harmony

this study is of significant importance as it sheds light on the unique concept of harmony in the culture of rote island, indonesia, and its potential for global application. the study, conducted between april and November 2021, revealed that rote island’s harmony concept offers notable advanta...

Unpacking Russia’s Cyber-Incident Response

ABSTRACT Western states are increasingly holding foreign governments accountable for cyberattacks. They couple public attribution of cyberattacks (PAC) with indictments, sanctions, and collective “naming and shaming” campaigns. Russia, however, while rou tinely subject to foreign cyber-intru...

Rising sun in the cyber domain: Japan’s strategic shift toward active cyber defense

This paper provides an in-depth analysis of Japan’s evolving cyber defense capabilities and explores its future challenges. National security has transformed in the twenty first century, with cyberspace becoming a key conflict domain. Japan, like other nations, has adapted to these changes. In 202...

Cyber-security governance framework pillars for Zimbabwean local authorities

this research study sought to determine pillars suitable for a cyber-security governance framework in Zimbabwean local authorities. this study utilizes an explanatory type of research which prompted the use of mixed methods, i.e. quantitative and qualitative under a pragmatism philosophy. the au...

Cyber-Weapons

tŚĂƚĂƌĞĐLJďĞƌͲǁĞĂƉŽŶƐ͍/ŶƐƚƌƵŵĞŶƚƐŽĨĐŽĚĞͲďŽƌŶĞĂƩĂĐŬƐƉĂŶĂǁŝĚĞƐƉĞĐƚƌƵŵ͕ĨƌŽŵ ŐĞŶĞƌŝĐďƵƚůŽǁͲƉŽƚĞŶƟĂůƚŽŽůƐƚŽƐƉĞĐŝĮĐďƵƚŚŝŐŚͲƉŽƚĞŶƟĂůǁĞĂƉŽŶƌLJ͘dŚŝƐĚŝƐƟ...

On market concentration and cybersecurity risk

ABSTRACT ARTICLE HISTORY Market concentration affects each component of the cybersecurity risk equation (i.e. threat, vulnerability and impact). As the Internet ecosystem becomes more concentrated across a number of vectors from users and incoming links to economic market share, the locus of ...

Cybersecurity and cyber defence in the emerging democracies

ABSTRACT ARTICLE HISTORY How do we interpret current cybersecurity and cyber defence affairs beyond what we know from the advanced democracies and industrialised states? This article argues that in the emerging democracies, the military is on its way to being the dominant force controlling cy...

Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services

Internet-of-Things (IoT) extends the provision of remotely managed services across different domains. At the same time, IoT devices primarily designed for home environments may also be installed within the premises of critical urban environments, such as government, banking and corporate domains, wi...

‘Prophet Ibrahim’s faith and interfaith dialogue: a philosophical inquiry into religious epistemology’.

the narrative of the Prophet ibrahim’s (a.s.) spiritual quest in search of his lord within the Qur’an sows the seeds of a philosophical investigation. this research is a qualitative study with a literature review approach, using primary and secondary data sources and content analysis as a dat...

Policy measures and cyber insurance: a framework

The role of the insurance industry in driving improvements in cyber security has been identified as mutually beneficial for both insurers and policy-makers. To date, there has been no consideration of the roles governments and the insurance industry should pursue in support of this public–private ...

Cyber risk and the changing role of insurance

ABSTRACT Abrief look at howthe cyber risk landscape is evolving and what this means from a risk and insurance perspective, particularly as businesses accept they cannot hope to prevent all cyber intrusions regardless of the sophistication of their IT security. While cyber insurance is currentl...

Tolerance of high school students in an urban transition city: a study in Batu Cit

This study explores religious tolerance attitudes among high school students in Batu City, a city experiencing urban transition. Utilizing a qualitative case study approach, data were gathered through in-depth interviews with key informants, specifically stu dent council presidents from five high ...

Five Pillars of American Grand Strategy

In a previous Survival article, I argued that, contrary to widespread belief, the United States has been pursuing at least one pillar of an implicit grand strategy since the end of the Cold War: building the democratic peace.1 The democratic peace has informed most major US foreign-policy initia...

Interfaith dialogue: seven key questions for theory, policy and practice

Interfaith dialogue is increasingly being recognised by govern ments across Europe as crucial to developing cohesive commu nities. This article critically analyses approaches for developing strategies to promote interfaith dialogue between individuals and/or organisations within civil society. It...

The survivability of autonomous vessels from cyber-attacks

This literature review is an investigation into the survivability of an automated vessel. More specifically, this study investigates an automated vessel’s susceptibility, vulnerability and ability to recover from a cybersecurity-relatedthreat. The future of maritime shipping istrendingtowardstrans...

Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?

ABSTRACT ARTICLE HISTORY This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major– and allegedly state-led– cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainia...

The Cyber Dimension of the Russia–Ukraine War

It was a surprise when Russia’s invasion of Ukraine in 2022 did not appear to be accompanied from the outset by Russian cyber operations aimed at extensively disabling Ukraine’s critical national infrastructure – for example, its telecommunications, banking, transport, water supply and energy ...

Proxy Warfare and the Future of Conflict

The contemporary dynamics of proxy warfare will make it a significant feature of the character of conflict in the future. Andrew Mumford identifies four major changes in the nature of modern warfare and argues that they point to a potential increase in the engagement of proxy strategies by state...

Cyber conflict short of war: a European strategic vacuum

ABSTRACT Cyber conflict short of war plays an increasingly important role in contemporary security politics. Dedicated to a study of three European NATO members– the Netherlands, France and Norway, this article expands the existing focus of the study of cyber conflict short of war beyond its...

Impact of Factors Influencing Cyber Threats on Autonomous Vehicles

Advanced Technologies are transforming the Automotive industry and the pace of innovation is accelerating at a breakneck speed. Autonomous Vehicles (AVs) incorporate many different systems and technologies and their increased computer functionality and connectivity lead to enormous cybersecurity ris...

STEAM-Integrated Interfaith Learning Through Maker Education: A Framework for Innovative Religious Learning

This article introduces a novel framework for primary-school inter faith learning, merging science, technology, engineering, arts, and mathematics (STEAM) and maker education. Our approach fosters dynamic classrooms, encouraging dialog, creativity, and collabora tion among diverse religious backgr...

Protocol construction for preventing the cyber nuclear terrorism in the nuclear power plants (NPPs) using the nonlinear algorithm

The nuclear security has been considered for the industrial terrorism preventions. In the fourth industrial revolution era, our life related systems are connected each other, which means the internet based networking is spread anywhere. It is suggested to make the modeling for the nuclear security i...

Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study

ABSTRACT Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly grow ing field. Although machine learning techniques worked well in solving large-scale cybersecurity pro...

Digital platforms, Hindutva, and disinformation: Communicative strategies and the Leicester violence

The digital infrastructure of Hindutva seeds, circulates and amplifies Islamophobic hate, interacting bidirectionally with brick-and- mortar violence. This paper examines the circulation of Hindutva on digital platforms (Twitter, Instagram, YouTube, and Telegram) around the intercommunal violen...

Cyber security of IP-based data communication network for power system operations

With the proliferation of Smart Grid technologies and IP-based Process Control and Condition Monitoring Systems for power system operations, bulk electric system (BES) is now more dependent on real-time information exchange between control centre and remote end Intelligent Electronic Devices (IED’...

The role of cyber intelligence in policing cybercrime in South Africa: Insights from law enforcement officers

ABSTRACT The rapid increase of technology and the sophistication in which it is used to obtain and manipulate information presents fertile ground for cybercriminals. Thus, the consequent increase of cybercrime in South Africa poses a threat to individuals, government, businesses, and security...

Cyber campaigns and strategic outcomes

While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory ...

Theorising the “suspect community”: counterterrorism, security practices and the public imagination

This article considers Hillyard’s first application of the term “suspect community” to the Irish in Britain in the era of the Prevention of Terrorism Act (PTA) and its more recent application to Muslims in the global war on terror. A review of the application of the term “suspect communi...

A US history of not conducting cyber attacks

There were numerous occasions when the US military considered conducting cyber attacks but refrained from doing so, but these have been largely overlooked as sources of insight. Six cases that we do know about – mostly from journalistic reporting – reveal much about US strategic thinking, postur...

Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing

Cyber diplomacy is critical in dealing with the digital era’s evolving cybersecurity dangers and possibilities. This article investigates the impact of Artificial Intelligence (AI), the Internet of Things (IoT), Blockchains, and Quantum Computing on cyber diplomacy. AI holds the potential for ...

Islamophobia, Islamic dress and precarious bodies

One of the most visible signifiers of Islam has been the veil – it covers the individual and preserves their privacy, while publicly declarin2021g the identity of its wearer. How it means and what it means has been the realm of binarized debate. Islamic dress as referred to in the title of this...

Governance of cyber warfare in the Netherlands: an exploratory investigation

This paper addresses the governance of cyber warfare capabilities in the Netherlands. A recent conceptual model of cyberspace is used, which distinguishes between a technical, sociotechnical, and governance layer. The issue of cyber warfare governance is addressed through a literature review, interv...

Great power narratives on the challenges of cyber norm building

States, companies and civil society actors broadly agree that ICT misuse needs to be prevented through effective international pol icies and regulatory efforts. However, corresponding norm-build ing processes have been repeatedly characterized by setbacks and controversies regarding interpretatio...

Social Media Mechanisms for Right-Wing Political Violence in the 21st Century: Discursive Opportunities, Group Dynamics, and Co Ordination

This article maps mechanisms by which online social media activities may contribute to right-wing political violence. High-impact studies on the wave of right-wing and racist violence in the 1990s and early 2000s established that mass media discourse on immigrants and previous violent incidents ...

Public opinion and alliance commitments in cybersecurity an attack against all?

Cyber operations as a facet of international competition pose a direct challenge to alliances. Designed to respond to con ventional military attacks, alliances like the North Atlantic Treaty Organization must now determine whether their defen sive commitments extend into cyberspace. This question ...

The hegemony of Prevent: turning counter terrorism policing into common sense

The British government’s Prevent Duty puts an obligation on spe cified public sectors to “keep people from being drawn into terror ism”. The policy has been a point of contention within the public discourse, but interview data shows that there is a grudging con sent for Prevent policing among...

The challenges of military adaptation to the cyber domain: a case study of the Netherlands

Whilst NATO speaks increasingly publicly about the military use of cyber opera tions, adaptation to the cyber domain has reportedly been challenging for most militaries. Little research has sought to understand the nature of these chal lenges. This study seeks to address this gap through a case stu...

The Totalitarianism of Jihadist Islamism and its Challenge to Europe and to Islam

This article highlights aspects of Islamism ignored in much conventional political science by applying to it a composite conceptual framework made up of Hannah Arendt’s concept of totalitarianism as an ideology, movement and system of rule; political religion conceptualised both as a cultural s...

Terrorism and Political Violence

This article highlights aspects of Islamism ignored in much conventional political science by applying to it a composite conceptual framework made up of Hannah Arendt’s concept of totalitarianism as an ideology, movement and system of rule; political religion conceptualised both as a cultural s...

Infrastructure Vulnerability Index of drinking water systems to terrorist attacks

Drinking water supply systems are vulnerable targets for which counter terrorism measures have been raised worldwide. The threat of terrorist attacks to these systems has led to the need for the international scientific community to deal with the vulnerability assessment related to such events. In...

Network security – an updated perspective

Network security is a specialized field consisting of the provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources as well as ensuring their availability through proper procedures. Many security devi...

errorism, trauma, tolerance: Bearing witness to white supremacist attack on Muslims in Christchurch, New Zealand

To bear witness to the aftermath of a terrorist atrocity as a national outpouring of grief and a memorialising of those who have passed away is a very touching and deeply emotional process. We were in Beijing when we learned of the mass slaughter of Muslim people at their most important day of g...

Showing 50 from 1505