Social network behavior and public opinion manipulation

L Chen, J Chen, C **a - Journal of Information Security and Applications, 2022 - Elsevier
The scope of cyberspace weapons is expanding from the physical network domain to the
cognitive information domain. Technologies such as network penetration, public opinion …

Cyber threats for operational technologies

G Assenza, L Faramondi, G Oliva… - International Journal of …, 2020 - inderscienceonline.com
Most critical sectors worldwide rely on operational technology (OT) whose cybersecurity,
due to the primary need of availability, results to be obsolete and inadequate. Episodes like …

National security 2.0: the cyber security of critical infrastructure

AB Darıcılı, S Çelik - PERCEPTIONS: Journal of International Affairs, 2022 - dergipark.org.tr
Thanks to technological advancements in recent years, critical infrastructure has become
both irreplaceable for modern social life—and highly vulnerable. Safe, effective and efficient …

Effects of 'Digital'Country's Information Security on Political Stability

TA Nguyen, K Koblandin… - Journal of Cyber …, 2022 - journals.riverpublishers.com
In this day and age, information security is becoming a priority not only in the system of
international economic relations but also at the state level. This study aims to study the effect …

Securing e-Estonia: challenges, insecurities, opportunities

A Hardy - Royal Holloway, University of London, 2022 - papers.ssrn.com
Estonia, as a nation, has progressed considerably since the resumption of independence in
1991. A national embrace of digital technology has been integral to the modernisation of the …

An assessment of the sustainability of living for Rohingya displaced people in cox's bazar camps in Bangladesh

MR Islam, MT Islam, MS Alam, M Hussain… - Journal of Human Rights …, 2022 - Springer
Ensuring human rights and fundamental needs of the forcefully displaced Myanmar
nationals (FDMN), also known as the Rohingyas, has become a critical concern for the host …

Juridical Analysis of Public Information Disclosure in Government Systems in the Digital Era

SS Karimullah, A Sugitanata… - Constitution …, 2023 - constitution.uinkhas.ac.id
This article conducts a juridical analysis of public information disclosure in government
systems in the digital era. The purpose of compiling this article is to identify legal issues …

India's Cyber Warfare Capabilities: Repercussions For Pakistan's National Security

MN Ashraf, SA Kayani - NDU Journal, 2023 - ndujournal.ndu.edu.pk
Cyber warfare refers to a state's ability to penetrate another state's digital systems to cause
disruption. Cyber warfare has emerged as the fifth operational warfighting domain. India has …

[BOOK][B] The Open World, Hackbacks and Global Justice

AJ Thomas - 2023 - Springer
One of the greatest gifts bestowed upon the global community by the Western world is the
belief that persons, information, good and services, and access to commonly cherished …

Cyber hegemony and information warfare: A case of Russia

A Rashid, AY Khan, SW Azim - Liberal Arts and Social Sciences …, 2021 - ideapublishers.org
The world has shifted to a digital landscape in the recent decade with both its perks and
underlying threats. Russia, throughout history has experimented with its information along …