Articles

166 Items

A funeral ceremony in Kobani, Syria

Wikicommons

Journal Article - E-International Relations (E-IR)

Societal (In)Security in the Middle East: Radicalism as a Reaction?

| Apr. 24, 2019

Societal insecurity, stemming from historical and functional realities has emboldened the identity-based gap of states vs. societies in the Arab region. The division of the Ottoman Empire into new states without much attention to identity lines, created a historical identity challenge in those states. On the other hand, Arab ruling elites’ efforts to enforce state-centred identities failed to prevent the challenge of conflicting identities. Later on, their functional inefficiencies emboldened the identity dichotomy.

As a result of threats perceived by Arab societies against their collective identity as well as separate challenges facing each state, the state-society gap continues to challenge state identities. Collectively perceived threats create and strengthen collective frameworks intended to address those threats. And among other frameworks come radical and terrorist organisations.

Donald Trump throws a hat into the audience

AP/Andrew Harnik, File

Magazine Article - China.org.cn

China, US Not in 'Cold War', but Cooperative Rivalry

    Authors:
  • Li Huiru
  • Li Xiaohua
| Jan. 11, 2019

Despite the opposition that appears now in China-U.S. relations, cooperation is far more important, underscored prominent U.S. political scientist Dr. Joseph S. Nye during an exclusive interview with Wang Xiaohui, editor-in-chief of China.org.cn, on Jan. 10, 2019.

Photo of Mark Zuckerberg preparing to resume testimony about user data on Facebook.

(AP Photo/Jacquelyn Martin)

Magazine Article - Belfer Center for Science and International Affairs, Harvard Kennedy School

America Needs to Align Technology with a Public Purpose

| Nov. 25, 2018

The arc of innovative progress has reached an inflection point, writes Ash Carter in The Atlantic. "Recent technological change that has brought immeasurable improvements to billions around the globe now threatens to overwhelm us. Making this disruption positive for all is the chief challenge of our time. We ourselves—not only market forces—should bend the arc of change toward human good. To do so, we must reinvigorate an ethos of public purpose that has become dangerously decoupled from many of today’s leading tech endeavors."

UN airplane at Goma airport, Goma DRC

Milli Lake

Journal Article - PS: Political Science and Politics

Ethics Abroad: Fieldwork in Fragile and Violent Contexts

| 2018

The diversity of political spaces, availability of cheap labor, ease of access to powerful figures, and safety net of a foreign passport attract researchers to the developing world. However, environments of extreme state weakness and ongoing conflict permit research behavior that would be frowned on in the global north. The authors suggest that weak regulatory authority in conflict-affected states offers foreign academics opportunities that are not available when states have greater reach or capacity.

teaser image

Journal Article - IEEE Internet of Things

IIoT Cybersecurity Risk Modeling for SCADA Systems

| Apr. 06, 2018

Abstract:

Urban critical infrastructure such as electric grids, water networks and transportation systems are prime targets for cyberattacks. These systems are composed of connected devices which we call the Industrial Internet of Things (IIoT). An attack on urban critical infrastructure IIoT would cause considerable disruption to society. Supervisory Control and Data Acquisition (SCADA) systems are typically used to control IIoT for urban critical infrastructure. Despite the clear need to understand the cyber risk to urban critical infrastructure, there is no data-driven model for evaluating SCADA software risk for IIoT devices. In this paper, we compare non-SCADA and SCADA systems and establish, using cosine similarity tests, that SCADA as a software subclass holds unique risk attributes for IIoT. We then disprove the commonly accepted notion that the Common Vulnerability Scoring System (CVSS) risk metrics of Exploitability and Impact are not correlated with attack for the SCADA subclass of software. A series of statistical models are developed to identify SCADA risk metrics that can be used to evaluate the risk that a SCADA-related vulnerability is exploited. Based on our findings, we build a customizable SCADA risk prioritization schema that can be used by the security community to better understand SCADA-specific risk. Considering the distinct properties of SCADA systems, a data-driven prioritization schema will help researchers identify security gaps specific to this software subclass that is essential to our society’s operations.