-
The Internet as a Threat to Sovereignty?
Many forces today, such as trade, global capital flows and environmental degradation, are thought to undermine sovereignty. The developing conventional wisdom seems to be that the internet is joining the assault on sovereignty and will, perhaps more than any of the other globalization forces, contribute to relegating sovereignty and its […]
Read all posts from ‘Global Issues’
-
The Changing Face of Terrorism
With a few notable exceptions, the weapons and tactics of terrorists have not changed, but the perceptions of threat and the vulnerability of modern societies have. [issuu width=420 height=299 backgroundColor=%23222222 documentId=120131145704-5ddfa9a8e8004d539af4227605d232ec name=the_changing_face_of_terrorism username=futurechallenges tag=cybercrime unit=px id=c4c498e3-b1e5-2a53-400e-880bbff742ea v=2]
-
Cyberwar is Coming!
Throughout history, military doctrine, organization and strategy have continually undergone profound changes due in part to technological breakthroughs. Today, a variety of new technologies are once again taking hold, and further innovations are on the way. [issuu width=420 height=272 backgroundColor=%23222222 documentId=120131150308-243f59728e0a4d56b61c889021259fcb name=cyberwar_is_coming_ username=futurechallenges tag=ict unit=px id=b0a28e44-2da4-3c5f-6f97-6b4ac4c5a16a v=2]
-
An Analysis of the Growth of Computer and Internet Security Breaches
This study uses the modified Gompertz model and sparse data to analyze the growth rates of different types of computer and internet-related crimes. [issuu width=420 height=272 backgroundColor=%23222222 documentId=120131151408-4d6b33a4909b4d8c9808ee10b3f90b5b name=bagchi_security username=futurechallenges tag=cybercrime unit=px id=6a2198cd-8823-3095-f96e-6413717504dc v=2]
-
Separating Threat From Hype: What Washington Needs to Know About Cyber Security
Washington has become transfixed by cyber security and with good reason. Cyber threats cost Americans billions of dollars each year and put U.S. troops at risk. Yet, too much of the discussion about cyber security is ill informed, and even sophisticated policymakers struggle to sort hype from reality. [issuu width=420 […]