Powered by Ajaxy

Cyber security

Visible War: Information War, Surveillance and Speed

Year: 2006

Cowardly Traitor or Heroic Whistleblower? The Impact of Edward Snowden’s Disclosures on Canada and the United Kingdom’s Security Establishments

Author(s): Alati — Daniel
Year: 2015

Beyond the Castle Model of Cybersecurity

Year: 2016
Subjects: Cyber security

Identifying Digital Threats in a Hacker Web Forum

Year: 2015

The ecology of trust among hackers

Year: 2016
Description:

Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …

The International Monetary Fund and Surveillance

Year: 2014

Centers of Concatenation: Fusing Data in Post-9/11 Security Organizations

Year: 2011

CSIS Annual Report, 2010-2011

Author(s): CSIS-
Geography: Canada, North America
Year: 2011

Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army

Author(s): Al-Rawi– Ahmed
Publisher: Elsevier
Year: 2013
Description:

This paper investigates the online hacking group, the Syrian Electronic Army (SEA), and examines its goals. (Source: Publication).

The Social Network of Hackers

Year: 2012
Description:

Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical – …

We Don’t Have These Laser Beams and Stuff Like That’: Police Investigations as Low-Tech Work in a High-Tech World

Publisher: Routledge
Year: 2012

The Proliferation of Cyber Security Strategies and Their Implications for Privacy

Author(s): Dupont– Benoit
Year: 2013
Description:

The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …

Evolving Transnational Threats and Border Security: A New Research Agenda

Geography: Canada, North America
Year: 2012

TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens

Publisher: TSAS
Year: 2014
Description:

In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …

Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor

Year: 2014
Description:

It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …

A Vision of Crimes in the Future

Author(s): Goodman- Marc
Publisher: TED Talk
Year: 2012

How Cyberattacks Threaten Real-World Peace

Publisher: TED Talk
Year: 2011

The Security Mirage

Author(s): Schneier- Bruce
Publisher: TED Talk
Year: 2011

Informing (In)Stability: The Security Implications of a Shifting News and Media Environment

Publisher: CSIS
Geography: Canada, North America
Year: 2012
Description:

This 60-page booklet contains highlights from the February 21-22 2012 conference that was held by the Canadian Security Intelligence Service in collaboration with Policy Horizons Canada.

Assessing Cyber Threats to Canadian Infrastructure

Publisher: CSIS
Geography: Canada, North America
Year: 2012
Description:

The purpose of this study is threefold: (1) to examine the cyber threat environment confronting Canada’s Critical National Infrastructure (CNI), with a particular focus on four key sectors and their – …

‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course

Year: 2013
Description:

This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. (Source: Publication).