The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Organisational Integration has become a key agenda point for policy-makers as governments continue to change and create new organisations to address the cyber threat. Passing references on this topic, however, far outnumber systematic treatments. The aim of this paper is to investigate the potential effects of organisational integration of offensive cyber capabilities (OIOCC). I argue that OIOCC may...
It is well accepted under international law that a State is generally responsible for the internationally wrongful acts of its de jure and de facto State organs. It is equally well accepted that a State is generally responsible for the internationally wrongful acts of non-State actors who are neither de jure nor de facto State organs if the State sufficiently directs and controls each element of the...
This paper investigates the emergence of an arms race dynamic in the international cyber domain. The numerous claims made of an ongoing cyber arms race by the media and other analysts have not been backed up by careful empirical analysis. Characterised by the competitive and rapid mutual build-up of capabilities between pairs of states, arms races are a long standing aspect of study in international...
Several indicators suggest that the international law of cyber security is in the midst of a crisis. First, proposals of internationally binding treaties by the leading stakeholders, including Russia and China, have been met with little enthusiasm by other states, and are generally seen as having limited prospects of success. Second, states are extremely reluctant to commit themselves to specific...
This paper aims to contribute to the debate regarding quantitative and qualitative appreciation of cyber power. It will do so by: (1) deriving a thorough foundation for the cyber power discussion from the 20th century power debate; (2) presenting a comprehensive framework for analysing (cyber) power; and (3) positioning cyber capacities within this framework. Revamping the 20th century power discussion...
For the eighth consecutive year, the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is proud to host the International Conference on Cyber Conflict (CyCon), which gathers experts from the government, military, academia and private sector to discuss the most pressing issues related to cyber defence. Once again CyCon serves as an interdisciplinary platform for networking and sharing...
Information Warfare and Influence Operations are, in principle, intended to get your own message across or to prevent your adversary from doing so. However, it is not just about developing a coherent and convincing storyline as it also involves confusing, distracting, dividing, and demoralising the adversary. From that perspective, cyberspace seems to be ideal for conducting such operations that will...
Evaluating an actor's ‘cyber power’ is an inherently complex problem involving a laundry list of military, normative, and technical variations. However, one important but under-theorised factor is the relationship between military social media operations and cyber operations. Policymakers, journalists, and even some academics often treat social media activity as a proxy variable for an actor's latent...
For the seventh year in a row, the International Conference on Cyber Conflict (CyCon) has brought together national security thinkers, strategists, political scientists, policy-makers, lawyers, and technology experts interested in cyber defence, and has served as a hub for knowledge and networking on an international level.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.