Articles

53 Items

Andrew Wakefield arrives at the General Medical Council in London to face a disciplinary panel investigating allegations of serious professional misconduct.

AP

Journal Article - Science

The Science of Fake News

    Authors:
  • David Lazer
  • Matthew A Baum
  • Yochai Benkler
  • Adam J Berinsky
  • Filippo Menczer
  • Miriam J Metzger
  • Brendan Nyhan
  • Gordon Pennycook
  • David Rothschild
  • Michael Schudson
  • Steven A Sloman
  • Cass R. Sunstein
  • Emily A Thorson
  • Duncan J Watts
| Mar. 08, 2018

The rise of fake news highlights the erosion of long-standing institutional bulwarks against misinformation in the internet age. Concern over the problem is global. However, much remains unknown regarding the vulnerabilities of individuals, institutions, and society to manipulations by malicious actors. A new system of safeguards is needed.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

Journal Article - Strife

A Beginner's Guide to the Musical Scales of Cyberwar

| Dec. 28, 2016

"Whether you are a cybersecurity professional, policymaker, or student, this article is a beginner's guide to understanding the 'musical scales' of cyberwar. Using the analogy of a piano keyboard, it aims to promote an understanding of what constitutes a use of force in cyberspace and how a state may lawfully respond."

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."

Journal Article - Survival

Cryptography and Sovereignty

    Author:
  • Ben Buchanan
| October-November 2016

Encryption's new normal is changing the way in which states assert their sovereignty at home and abroad. Cryptography has gone mainstream. Now more than ever, encryption is used by ordinary citizens, often without their knowledge, and is a subject of national debate.