scholarly journals Cyber Warfare & Inadvertent Escalation

Daedalus ◽  
2020 ◽  
Vol 149 (2) ◽  
pp. 133-149 ◽  
Author(s):  
James M. Acton

The advent of cyber warfare exacerbates the risk of inadvertent nuclear escalation in a conventional conflict. In theory, cyber espionage and cyberattacks could enhance one state's ability to undermine another's nuclear deterrent. Regardless of how effective such operations might prove in practice, fear of them could generate escalatory “use-‘em-before-you-lose-‘em” pressures. Additionally, cyber threats could create three qualitatively new mechanisms by which a nuclear-armed state might incorrectly conclude that its nuclear deterrent was under attack. First, cyber espionage could be mistaken for a cyberattack. Second, malware could accidentally spread from systems that supported non-nuclear operations to nuclear-related systems. Third, an operation carried out by a third party could be misattributed by one state in a bilateral confrontation to its opponent. Two approaches to risk reduction are potentially viable in the short term: unilateral restraint in conducting potentially escalatory cyber operations, and bilateral or multilateral behavioral norms.

2018 ◽  
pp. 1694-1711
Author(s):  
Nenad Putnik ◽  
Mladen Milošević

In this chapter, the authors discuss the phenomenon of interstate conflicts in cyber space. In the last twenty years, this issue has become more explicit, and countries are making increasingly frequent mutual cyber warfare and cyber espionage accusations. The political and military elite of conflicting countries perceive the situation as very serious and are preparing not only for defending their segment of cyber space, but for developing offensive strategies for cyber warfare, as well. The authors endeavor to contribute to peace research by examining the possibilities for achieving cyber détente, the idea promoted by Henry Kissinger in 2011. In this chapter, the authors identify and analyze problems whose solution should be the focus of the States Parties to cyber détente: the question of denotation and potential desecuritization of technical terms, the question of identification and classification of cyber threats and the problem of the legal framework for their opposition. In addition, the authors give guidelines for their solution, based on securitization theory.


Author(s):  
Nenad Putnik ◽  
Mladen Milošević

In this chapter, the authors discuss the phenomenon of interstate conflicts in cyber space. In the last twenty years, this issue has become more explicit, and countries are making increasingly frequent mutual cyber warfare and cyber espionage accusations. The political and military elite of conflicting countries perceive the situation as very serious and are preparing not only for defending their segment of cyber space, but for developing offensive strategies for cyber warfare, as well. The authors endeavor to contribute to peace research by examining the possibilities for achieving cyber détente, the idea promoted by Henry Kissinger in 2011. In this chapter, the authors identify and analyze problems whose solution should be the focus of the States Parties to cyber détente: the question of denotation and potential desecuritization of technical terms, the question of identification and classification of cyber threats and the problem of the legal framework for their opposition. In addition, the authors give guidelines for their solution, based on securitization theory.


2017 ◽  
Vol 13 (10) ◽  
pp. 5923-5926
Author(s):  
Mrs. A. Lakshmi Priya ◽  
S. Letitia

Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking. 


2021 ◽  
Vol 16 (1) ◽  
Author(s):  
Takahiro Kinoshita ◽  
Kensuke Moriwaki ◽  
Nao Hanaki ◽  
Tetsuhisa Kitamura ◽  
Kazuma Yamakawa ◽  
...  

Abstract Background Hybrid emergency room (ER) systems, consisting of an angiography-computed tomography (CT) machine in a trauma resuscitation room, are reported to be effective for reducing death from exsanguination in trauma patients. We aimed to investigate the cost-effectiveness of a hybrid ER system in severe trauma patients without severe traumatic brain injury (TBI). Methods We conducted a cost-utility analysis comparing the hybrid ER system to the conventional ER system from the perspective of the third-party healthcare payer in Japan. A short-term decision tree and a long-term Markov model using a lifetime time horizon were constructed to estimate quality-adjusted life years (QALYs) and associated lifetime healthcare costs. Short-term mortality and healthcare costs were derived from medical records and claims data in a tertiary care hospital with a hybrid ER. Long-term mortality and utilities were extrapolated from the literature. The willingness-to-pay threshold was set at $47,619 per QALY gained and the discount rate was 2%. Deterministic and probabilistic sensitivity analyses were conducted. Results The hybrid ER system was associated with a gain of 1.03 QALYs and an increment of $33,591 lifetime costs compared to the conventional ER system, resulting in an ICER of $32,522 per QALY gained. The ICER was lower than the willingness-to-pay threshold if the odds ratio of 28-day mortality was < 0.66. Probabilistic sensitivity analysis indicated that the hybrid ER system was cost-effective with a 79.3% probability. Conclusion The present study suggested that the hybrid ER system is a likely cost-effective strategy for treating severe trauma patients without severe TBI.


Animals ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 830
Author(s):  
Temple Grandin

In the U.S., the most severe animal welfare problems caused by COViD-19 were in the pork industry. Thousands of pigs had to be destroyed on the farm due to reduced slaughter capacity caused by ill workers. In the future, both short-term and long-term remedies will be needed. In the short-term, a portable electrocution unit that uses scientifically validated electrical parameters for inducing instantaneous unconsciousness, would be preferable to some of the poor killing methods. A second alternative would be converting the slaughter houses to carcass production. This would require fewer people to process the same number of pigs. The pandemic revealed the fragility of large centralized supply chains. A more distributed supply chain with smaller abattoirs would be more robust and less prone to disruption, but the cost of pork would be greater. Small abattoirs can coexist with large slaughter facilities if they process pigs for specialized premium markets such as high welfare pork. The pandemic also had a detrimental effect on animal welfare inspection and third party auditing programs run by large meat buyers. Most in-person audits in the slaughter plants were cancelled and audits were done by video. Video audits should never completely replace in-person audits.


Author(s):  
Elisa Guagenti Grandori

This work focuses on decision problems concerning risk reduction in the case of catastrophic events, which are scarsely predictable but associated to severe expected damage. A cryterium is outlined in order to judge the relative credibility of competing models. The knowledge-decision process is dissected in its components. The steps of the procedure from knowledge to final decision are analyzed. The effectiveness of short-term prediction and the choice of the acceptable risk are also discussed. A few case studies, related to earthquakes, landslides and pollution, are exposed.


2013 ◽  
Vol 8 (4) ◽  
Author(s):  
Phamela D Tampubolon ◽  
David Paul Elia Saerang ◽  
Agus Toni Poputra

Amid competition is so rapid and uncertain economic conditions, every company is required to be more efficient in order tobe more efficient in orderto survive and all of it can not be separated from the role of management.  Management measure which is occupied to measure the success or failure of the company is profit. To produce an efficient profit differential accounting information requires management to select the best course of action among alternatives available. The purpose of this study is to analyze the application of differential accounting information in the decision to buy or make your own semi-finished products on UD. Berkat Anugerah. This study uses a descriptive research method. The result of the analysis of research conducted on UD. Berkat Anugerah seen from the cost accounting showed diferential role in the short-term decision making, where the company should buy semi-finished products from third party cost incurred due to lower than producing its own.


2012 ◽  
Vol 8 (2) ◽  
pp. 34-38
Author(s):  
Mark T. Kozlowski

The 2012 primary season has been one of the most volatile in recent memory, with the Republican Party struggling to settle on a candidate. The campaign has also vaulted some previously obscure politicians to national prominence, only to relegate them again to obscurity. Ron Paul has demonstrated perhaps the most dramatic transformation, from a lone voice who was once largely ignored to one of the last four candidates for the nomination, who has performed quite creditably in several primaries. In this article, I examine how much influence Paul is going to have in the short term, up to and including the Republican National Convention. I also examine how lasting his influence will be over the long term, and whether or not he will mount a third-party bid in 2012.


2020 ◽  
Vol 8 (3-4) ◽  
pp. 364-386
Author(s):  
Aisalkyn Botoeva

Abstract Attending to the rise of halal economy and particularly halal certification initiatives in the region and globally, this paper asks why and how third-party certifiers would gain credibility and authority, and what does authority have to do with the work of entrepreneurs in the sector. Drawing on fieldwork conducted between 2012 and 2015, and interviews with entrepreneurs and a private halal certification agency in Kyrgyzstan as well as their accreditors in Kazakhstan, I pay close attention to the collective meaning-making deliberations that revolve around questions of what makes goods and services halal and also what makes one a ‘good Muslim’. Certifiers and entrepreneurs come to form what I call a valuation circuit. In these circuits, they construct shared understandings of ethnical and behavioral norms for market actors, create and reinforce binaries around halal and haram, and rely on transnational network of religious authority as they attempt to valuate and measure compliance to halal standards.


2019 ◽  
pp. 571-589
Author(s):  
Clay Wilson ◽  
Nicole Drumhiller

It is assumed by most observers that China is copying or stealing vast amounts of intellectual property from US military and private industry through its cyber espionage activities, and then sharing that information with state-owned industries, giving them unfair economic advantages. The US also conducts cyber espionage against China and other nations, but chooses to not share the vast collections of intellectual property and data with its own domestic industries. By choosing not to do the same thing as China, the US may be placing itself at an economic disadvantage, and may also mistakenly be accusing China of threatening cyber warfare. What is needed is a clearer understanding of differences in national cultures that contribute to intolerance between the US and China when it comes to economics, threats of war, and the evolving new role of cyber espionage.


Sign in / Sign up

Export Citation Format

Share Document