Articles

43 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

iPad Mini Smart Case

Wikimedia CC/Ashley Pomeroy

Journal Article - Journal of Cybersecurity

Privacy Threats in Intimate Relationships

| 2020

This article provides an overview of intimate threats: a class of privacy threats that can arise within families, romantic partnerships, close friendships, and caregiving relationships. The authors survey a range of intimate relationships and describe their common features. Based on these features, they explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

teaser image

Journal Article - Journal of Cybersecurity

Rules of Engagement for Cyberspace Operations: A View From the USA

| March 2017

As cyber weapons are incorporated into US military planning, policy makers and field commanders will increasingly confront a core issue: How to formulate the rules of engagement (ROEs) for US forces with regard to military operations that may use such weapons. Michael Sulmeyer, Herbert Lin, and C. Robert Kehler address ROEs from the perspective of US military operators. 

Journal Article - Strife

A Beginner's Guide to the Musical Scales of Cyberwar

| Dec. 28, 2016

"Whether you are a cybersecurity professional, policymaker, or student, this article is a beginner's guide to understanding the 'musical scales' of cyberwar. Using the analogy of a piano keyboard, it aims to promote an understanding of what constitutes a use of force in cyberspace and how a state may lawfully respond."

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."