Search results

1 – 10 of 252
Article
Publication date: 21 May 2020

Christian Pauletto

The development of technologies for the conduct of cyber operations represents an opportunity for states to defend their interests in international relations but also bears risks…

Abstract

Purpose

The development of technologies for the conduct of cyber operations represents an opportunity for states to defend their interests in international relations but also bears risks and challenges. Since the early 2000s, the United Nations “group of governmental experts (GGE) on developments in the field of information and telecommunications in the context of international security” debates on this issue. This paper aims to investigate how states are challenged in the development of international cyber norms and where capacity to act is idle, i.e. to assess how much has been reached in the international community’s debate on cyber threats and malicious behaviors in the international security context and to identify directions to move GGE work further.

Design/methodology/approach

The methodology uses an extensive text-based desk research and relies on a thorough collection, analysis and interpretation of the United Nations (UNs) documents. When specific substantial topics are addressed in the GGE, the content of the debate was confronted with issue-specific academic literature on those matters.

Findings

The results highlight that the GGE managed to gather consensus on a number of cooperation and normative measures in this politically highly sensitive topic and more deliverables are expected during this and next year. The paper identifies a weakness in terms of operational implementation though. The paper proposes a few examples of concrete headways that could complement existing consensus, especially on the implementation side.

Originality/value

Because of its political sensitivity, the GGE has worked with discretion and has attracted little academic attention. This paper is an original and timely attempt to assess the achievements and possible outlook of this endeavor of the international community, including the incipient work of a recently established open-ended working group. It also attempts to connect the subject matter discussed in the UN with related academic literature, including in respect of definitional and conceptual issues.

Details

Transforming Government: People, Process and Policy, vol. 14 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Expert briefing
Publication date: 6 February 2019

China's cyber diplomacy efforts.

Details

DOI: 10.1108/OXAN-DB241664

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 14 February 2019

Cybersecurity outlook.

Expert briefing
Publication date: 18 May 2017

China's new strategy.

Details

DOI: 10.1108/OXAN-DB220941

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 7 October 2022

Juan-Luis Manfredi-Sánchez and Nicholas Ross Smith

The purpose of this research is to identify the strengths and weaknesses of the EU's public diplomacy – towards both domestic and external audiences – during times of crisis. The…

Abstract

Purpose

The purpose of this research is to identify the strengths and weaknesses of the EU's public diplomacy – towards both domestic and external audiences – during times of crisis. The EU's public diplomacy is examined across six major crises: the Eurozone crisis (2008), the Ukrainian crisis (2014), the migrant crisis (2015), the Brexit referendum (2016), the new transatlantic relationship (2017) and the COVID-19 pandemic (2020). The goal of examining these crises in conjunction is to derive policy-relevant insights.

Design/methodology/approach

This article adopts a problem-driven approach – the problem being how successful is the EU at public diplomacy during times of crisis – that draws theoretical and empirical insights from Communication Studies, International Relations and EU studies via a “strategic narratives” framework. It situates the EU as a unique public diplomacy actor, one which is becoming more prominent due to the mediatisation of diplomacy, especially driven by the advent of cyberspace.

Findings

The article finds that the EU has been experiencing a cycle of crises that have affected the political, economic, symbolic and social foundations of the common project. The EU has had some notable success – such as restoring confidence at the height of the Eurozone crisis – and some notable challenges – such as effectively combatting disinformation. Regardless, the EU has the potential to better manage these and future crises by engaging in an effective public diplomacy strategy that tells a shared European story that informs and inspires people, both domestically and externally.

Originality/value

The article offers an original examination of the EU's public diplomacy response to six different crises. It looks at different types of crises and utilises concepts from different social science perspectives. It offers novel strategic and policy recommendations.

Details

Journal of Communication Management, vol. 27 no. 2
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 3 November 2021

James Pérez-Morón

The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a…

Abstract

Purpose

The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance.

Design/methodology/approach

A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted.

Findings

Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organization-environment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context).

Research limitations/implications

This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review.

Practical implications

This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network.

Originality/value

Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework.

Details

Journal of Asia Business Studies, vol. 16 no. 2
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 2 March 2023

Giddeon Njamngang Angafor, Iryna Yevseyeva and Leandros Maglaras

This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security…

Abstract

Purpose

This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security posture as it adapts to remote working because of the Coronavirus 2019 (COVID-19). The pandemic forced businesses to move operations from offices to remote working. Given that this happened quickly for many, some firms had little time to factor in appropriate cyber-hygiene and incident prevention measures, thereby exposing themselves to vulnerabilities such as phishing and other scams.

Design/methodology/approach

The exercise was designed and facilitated through Microsoft Teams. The approach used included a literature review and an experiential learning method that used scenario-based, active pedagogical strategies such as case studies, simulations, role-playing and discussion-focused techniques to develop and evaluate processes and procedures used in preventing, detecting, mitigating, responding and recovering from cyber incidents.

Findings

The exercise highlighted the value of using scenario-based exercises in cyber security training. It elaborated that scenario-based incident response (IR) exercises are beneficial because well-crafted and well-executed exercises raise cyber security awareness among managers and IT professionals. Such activities with integrated operational and decision-making components enable businesses to evaluate IR and disaster recovery (DR) procedures, including communication flows, to improve decision-making at strategic levels and enhance the technical skills of cyber security personnel.

Practical implications

It maintained that the primary implication for practice is that they enhance security awareness through practical experiential, hands-on exercises such as this VIRTTX. These exercises bring together staff from across a business to evaluate existing IR/DR processes to determine if they are fit for purpose, establish existing gaps and identify strategies to prevent future threats, including during challenging circumstances such as the COVID-19 outbreak. Furthermore, the use of TTXs or TTEs for scenario-based incident response exercises was extremely useful for cyber security practice because well-crafted and well-executed exercises have been found to serve as valuable and effective tools for raising cyber security awareness among senior leadership, managers and IT professionals (Ulmanová, 2020).

Originality/value

This paper underlines the importance of practical, scenario-based cyber-IR training and reports on the experience of conducting a virtual IR/DR tabletop exercise within a large organisation.

Article
Publication date: 18 June 2020

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

The purpose of this paper is to review the effect of cybercrime in the banking sector.

2399

Abstract

Purpose

The purpose of this paper is to review the effect of cybercrime in the banking sector.

Design/methodology/approach

This study uses a survey of literature and the balanced scorecard (BSC) to analyse the effect of cybercrime on the banking sector.

Findings

The literature reviewed confirms an increasing wave of cybercrime that has impacted negatively on the good will and economic growth of financial institutions, indirectly through loss of trust in the digital infrastructure or directly through fraud and extortion in both developing and developed countries.

Research limitations

This study is limited to the application of BSC to analyse the effect of cybercrime in the banking sector only.

Practical implications

To avert on going massive losses owing to cybercrime, the authors quest for development of an alert system that can create the awareness of both the banks and the customers by effectively implementing and integrating big data technology into their system to mitigate the negative impacts of cybercrime.

Originality/value

The novelty of this study lies in the fact that this study uses the BSC for the analysis of cybercrime in the banking sector, a problem that has not been sufficiently highlighted in the existing literature.

Details

Journal of Financial Crime, vol. 27 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 252