Public and private actors engage in cyber warfare. In the private field, the role of individuals is rather limited: Individuals are usually either hackers or targets of cyber crimes. This paradigm could change soon, as individuals might now face a new threat: Information. In 2014, a group of hackers launched a cyber attack on Sony Pictures Entertainment, and released, inter alia, personally identifiable information on their employees, including email correspondence and information about executive salaries. This incident revealed a terrifying new reality: Cyber attacks could result in a revelation of our entire personal information held by third parties. Emails, search queries, credit card numbers, purchase history, and anything we do online...
Avoiding attacks on civilian targets during cyberwarfare is more difficult than it seems. We discuss...
The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Gl...
The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Gl...
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the lit...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
International audienceAfter decades of digitalization spreading into every area of our lives, with v...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
This Policy Essay discusses the emerging security threat of cyberterrorism and the historical impuls...
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated n...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyber incidents are a growing menace for states and individuals alike. Even though they have been ar...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
Healthcare organisations have become a key target for attackers as evidenced by the global increase ...
This Article reviews how the Internet and related developments-technological, social, and legal-have...
Avoiding attacks on civilian targets during cyberwarfare is more difficult than it seems. We discuss...
The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Gl...
The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Gl...
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the lit...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
International audienceAfter decades of digitalization spreading into every area of our lives, with v...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
This Policy Essay discusses the emerging security threat of cyberterrorism and the historical impuls...
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated n...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyber incidents are a growing menace for states and individuals alike. Even though they have been ar...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
Healthcare organisations have become a key target for attackers as evidenced by the global increase ...
This Article reviews how the Internet and related developments-technological, social, and legal-have...
Avoiding attacks on civilian targets during cyberwarfare is more difficult than it seems. We discuss...
The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Gl...
The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Gl...