Browsing by Subject "Cybersecurity"
- Results Per Page
- Sort Options
Item Open Access Automated Learning of Event Coding Dictionaries for Novel Domains with an Application to Cyberspace(2016) Radford, Benjamin JamesEvent data provide high-resolution and high-volume information about political events. From COPDAB to KEDS, GDELT, ICEWS, and PHOENIX, event datasets and the frameworks that produce them have supported a variety of research efforts across fields and including political science. While these datasets are machine-coded from vast amounts of raw text input, they nonetheless require substantial human effort to produce and update sets of required dictionaries. I introduce a novel method for generating large dictionaries appropriate for event-coding given only a small sample dictionary. This technique leverages recent advances in natural language processing and deep learning to greatly reduce the researcher-hours required to go from defining a new domain-of-interest to producing structured event data that describes that domain. An application to cybersecurity is described and both the generated dictionaries and resultant event data are examined. The cybersecurity event data are also examined in relation to existing datasets in related domains.
Item Open Access China's Internet Governance: A New Conceptualization of the Cyber-Sovereignty Model(2019-04-09) Zhang, QiangIn recent years, China’s Internet governance regime has been subject to increasing literature scrutiny and attention. A rising superpower, China’s vision for the Internet on domestic and international stages has far-reaching implications for the future cyber world order. While traditional theories of governance typically categorize China as a cyber-sovereign nation, I argue that China’s approach is more nuanced and can better be considered under a “flexible” cyber-sovereignty model. Through both a historical and case-study analysis, I suggest that this new model for China better considers the effects of new, rising capital forces—Chinese internet corporations—and explains the dynamic mix of rejection and assimilation into the existing regime that characterizes China’s current Internet governance strategy. Ultimately, this new model can help us conceptualize China’s vision and strategy for Internet governance, which can have far-ranging implications for the future of cyberspace and the Internet as we know it.Item Open Access The Cybersecurity Dilemma(2011) Rueter, NicholasScholars have long recognized and debated the effects of the "security dilemma," where efforts by states to enhance their security can decrease the security of others. The severity of a security dilemma, and the prospects for cooperation under the dilemma, are greatly affected by military technology. In this article, I apply the security dilemma framework to a revolutionary new form of conflict: cyberwarfare. I argue that cooperation over cyberwarfare is made challenging due to the security dilemma, and that the unique characteristics of cyberwarfare make it difficult to break out of this dilemma. The reluctance and failure of states to achieve cooperation over cyberwarfare likely reflects, in part, the constraints of this "cybersecurity dilemma." Some states have strong incentives, however, to promote limitations on offensive cyberwarfare. Thus, I propose ways in which cooperation may eventually be achieved despite these challenges.