Search results
1 – 10 of 252The development of technologies for the conduct of cyber operations represents an opportunity for states to defend their interests in international relations but also bears risks…
Abstract
Purpose
The development of technologies for the conduct of cyber operations represents an opportunity for states to defend their interests in international relations but also bears risks and challenges. Since the early 2000s, the United Nations “group of governmental experts (GGE) on developments in the field of information and telecommunications in the context of international security” debates on this issue. This paper aims to investigate how states are challenged in the development of international cyber norms and where capacity to act is idle, i.e. to assess how much has been reached in the international community’s debate on cyber threats and malicious behaviors in the international security context and to identify directions to move GGE work further.
Design/methodology/approach
The methodology uses an extensive text-based desk research and relies on a thorough collection, analysis and interpretation of the United Nations (UNs) documents. When specific substantial topics are addressed in the GGE, the content of the debate was confronted with issue-specific academic literature on those matters.
Findings
The results highlight that the GGE managed to gather consensus on a number of cooperation and normative measures in this politically highly sensitive topic and more deliverables are expected during this and next year. The paper identifies a weakness in terms of operational implementation though. The paper proposes a few examples of concrete headways that could complement existing consensus, especially on the implementation side.
Originality/value
Because of its political sensitivity, the GGE has worked with discretion and has attracted little academic attention. This paper is an original and timely attempt to assess the achievements and possible outlook of this endeavor of the international community, including the incipient work of a recently established open-ended working group. It also attempts to connect the subject matter discussed in the UN with related academic literature, including in respect of definitional and conceptual issues.
Details
Keywords
China's cyber diplomacy efforts.
Details
DOI: 10.1108/OXAN-DB241664
ISSN: 2633-304X
Keywords
Geographic
Topical
Cybersecurity outlook.
Details
DOI: 10.1108/OXAN-DB241858
ISSN: 2633-304X
Keywords
Geographic
Topical
China's new strategy.
Details
DOI: 10.1108/OXAN-DB220941
ISSN: 2633-304X
Keywords
Geographic
Topical
This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…
Abstract
Purpose
This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.
Design/methodology/approach
This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.
Findings
Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.
Originality/value
To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.
Details
Keywords
Juan-Luis Manfredi-Sánchez and Nicholas Ross Smith
The purpose of this research is to identify the strengths and weaknesses of the EU's public diplomacy – towards both domestic and external audiences – during times of crisis. The…
Abstract
Purpose
The purpose of this research is to identify the strengths and weaknesses of the EU's public diplomacy – towards both domestic and external audiences – during times of crisis. The EU's public diplomacy is examined across six major crises: the Eurozone crisis (2008), the Ukrainian crisis (2014), the migrant crisis (2015), the Brexit referendum (2016), the new transatlantic relationship (2017) and the COVID-19 pandemic (2020). The goal of examining these crises in conjunction is to derive policy-relevant insights.
Design/methodology/approach
This article adopts a problem-driven approach – the problem being how successful is the EU at public diplomacy during times of crisis – that draws theoretical and empirical insights from Communication Studies, International Relations and EU studies via a “strategic narratives” framework. It situates the EU as a unique public diplomacy actor, one which is becoming more prominent due to the mediatisation of diplomacy, especially driven by the advent of cyberspace.
Findings
The article finds that the EU has been experiencing a cycle of crises that have affected the political, economic, symbolic and social foundations of the common project. The EU has had some notable success – such as restoring confidence at the height of the Eurozone crisis – and some notable challenges – such as effectively combatting disinformation. Regardless, the EU has the potential to better manage these and future crises by engaging in an effective public diplomacy strategy that tells a shared European story that informs and inspires people, both domestically and externally.
Originality/value
The article offers an original examination of the EU's public diplomacy response to six different crises. It looks at different types of crises and utilises concepts from different social science perspectives. It offers novel strategic and policy recommendations.
Details
Keywords
The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a…
Abstract
Purpose
The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance.
Design/methodology/approach
A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted.
Findings
Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organization-environment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context).
Research limitations/implications
This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review.
Practical implications
This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network.
Originality/value
Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework.
Details
Keywords
Giddeon Njamngang Angafor, Iryna Yevseyeva and Leandros Maglaras
This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security…
Abstract
Purpose
This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security posture as it adapts to remote working because of the Coronavirus 2019 (COVID-19). The pandemic forced businesses to move operations from offices to remote working. Given that this happened quickly for many, some firms had little time to factor in appropriate cyber-hygiene and incident prevention measures, thereby exposing themselves to vulnerabilities such as phishing and other scams.
Design/methodology/approach
The exercise was designed and facilitated through Microsoft Teams. The approach used included a literature review and an experiential learning method that used scenario-based, active pedagogical strategies such as case studies, simulations, role-playing and discussion-focused techniques to develop and evaluate processes and procedures used in preventing, detecting, mitigating, responding and recovering from cyber incidents.
Findings
The exercise highlighted the value of using scenario-based exercises in cyber security training. It elaborated that scenario-based incident response (IR) exercises are beneficial because well-crafted and well-executed exercises raise cyber security awareness among managers and IT professionals. Such activities with integrated operational and decision-making components enable businesses to evaluate IR and disaster recovery (DR) procedures, including communication flows, to improve decision-making at strategic levels and enhance the technical skills of cyber security personnel.
Practical implications
It maintained that the primary implication for practice is that they enhance security awareness through practical experiential, hands-on exercises such as this VIRTTX. These exercises bring together staff from across a business to evaluate existing IR/DR processes to determine if they are fit for purpose, establish existing gaps and identify strategies to prevent future threats, including during challenging circumstances such as the COVID-19 outbreak. Furthermore, the use of TTXs or TTEs for scenario-based incident response exercises was extremely useful for cyber security practice because well-crafted and well-executed exercises have been found to serve as valuable and effective tools for raising cyber security awareness among senior leadership, managers and IT professionals (Ulmanová, 2020).
Originality/value
This paper underlines the importance of practical, scenario-based cyber-IR training and reports on the experience of conducting a virtual IR/DR tabletop exercise within a large organisation.
Details
Keywords
Chinese projects in Balkans.
Details
DOI: 10.1108/OXAN-DB246363
ISSN: 2633-304X
Keywords
Geographic
Topical
Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun
The purpose of this paper is to review the effect of cybercrime in the banking sector.
Abstract
Purpose
The purpose of this paper is to review the effect of cybercrime in the banking sector.
Design/methodology/approach
This study uses a survey of literature and the balanced scorecard (BSC) to analyse the effect of cybercrime on the banking sector.
Findings
The literature reviewed confirms an increasing wave of cybercrime that has impacted negatively on the good will and economic growth of financial institutions, indirectly through loss of trust in the digital infrastructure or directly through fraud and extortion in both developing and developed countries.
Research limitations
This study is limited to the application of BSC to analyse the effect of cybercrime in the banking sector only.
Practical implications
To avert on going massive losses owing to cybercrime, the authors quest for development of an alert system that can create the awareness of both the banks and the customers by effectively implementing and integrating big data technology into their system to mitigate the negative impacts of cybercrime.
Originality/value
The novelty of this study lies in the fact that this study uses the BSC for the analysis of cybercrime in the banking sector, a problem that has not been sufficiently highlighted in the existing literature.
Details