Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
Technological advances have resulted in organizations digitalizing many parts of their
operations. The threat landscape of cyberattacks is rapidly changing and the potential …
operations. The threat landscape of cyberattacks is rapidly changing and the potential …
Cyber warfare: Issues and challenges
The topic of cyber warfare is a vast one, with numerous sub topics receiving attention from
the research community. We first examine the most basic question of what cyber warfare is …
the research community. We first examine the most basic question of what cyber warfare is …
How social media is changing conflict
T Zeitzoff - Journal of Conflict Resolution, 2017 - journals.sagepub.com
Social media increasingly plays a role in conflict and contentious politics. Politicians,
leaders, insurgents, and protestors all have used it as a tool for communication. At the same …
leaders, insurgents, and protestors all have used it as a tool for communication. At the same …
[BOEK][B] Cyber mercenaries: The state, hackers, and power
T Maurer - 2018 - books.google.com
Cyber Mercenaries explores the secretive relationships between states and hackers. As
cyberspace has emerged as the new frontier for geopolitics, states have become …
cyberspace has emerged as the new frontier for geopolitics, states have become …
Cyber security meets security politics: Complex technology, fragmented politics, and networked science
M Dunn Cavelty, A Wenger - Contemporary Security Policy, 2020 - Taylor & Francis
In the last decade, cyber incidents have become more expensive, more disruptive, and in
many cases more political, with a new body of theoretically informed research emerging in …
many cases more political, with a new body of theoretically informed research emerging in …
The hidden threat of cyber-attacks–undermining public confidence in government
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical
destruction-but rather more insidious societal risks such as reduced trust in government. To …
destruction-but rather more insidious societal risks such as reduced trust in government. To …
[BOEK][B] The cybersecurity dilemma: Hacking, trust, and fear between nations
B Buchanan - 2016 - books.google.com
Why do nations break into one another's most important computer networks? There is an
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …
Cyber campaigns and strategic outcomes
RJ Harknett, M Smeets - Journal of Strategic Studies, 2022 - Taylor & Francis
While much focus has remained on the concept of cyberwar, what we have been observing
in actual cyber behaviour are campaigns comprised of linked cyber operations, with the …
in actual cyber behaviour are campaigns comprised of linked cyber operations, with the …
Publicly attributing cyber attacks: a framework
When should states publicly attribute cyber intrusions? Whilst this is a question governments
increasingly grapple with, academia has hardly helped in providing answers. This article …
increasingly grapple with, academia has hardly helped in providing answers. This article …