Query Result Set
Skip Navigation Links
   ActiveUsers:1130Hits:19630015Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
APT (2) answer(s).
 
SrlItem
1
ID:   152746


ASEAN as a community of managerial practices / Bae, Ki-Hyun   Journal Article
Bae, Ki-Hyun Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How is the Association of Southeast Asian Nations performing as a manager of regional cooperative activities in East Asia? Despite increasing attention regarding its role in development of East Asian regionalism, few scholarly discussions about the effectiveness of ASEAN's managerial practices at the operational level have been attempted. This article aims to fill the scholarly gap based on the author's participatory observation of discussions among practitioners regarding management of cooperative activities for ASEAN mechanisms. It suggests that ASEAN's performance as a driver of East Asian cooperation has been insufficient and may possibly have weakened the mechanisms for greater cooperation.
        Export Export
2
ID:   192046


Mitigating the Risk of Advanced Cyber Attacks: the Role of Quality, Covertness and Intensity of Use of Cyber Weapons / Gilad, Amitai; Tishler, Asher   Journal Article
Tishler, Asher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Modern countries employ computer networks that manage organizations in the private and public sectors. Cyber-attacks aim to disrupt, block, delete, manipulate or steal the data held in these networks, which challenge these countries’ national security. Consequently, cybersecurity programs must be developed to protect these networks from cyber-attacks in a manner that is similar to operations against terrorism. This study presents several models that analyze a contest between a network operator (defender) that deploys costly detectors to protect the network and a capable cyber attacker. Generally, when the deployed detectors become more potent or the defender exhibits higher vigilance, the attacker allocates more resources to R&D to ensure that the attack remains covert. We show that detectors may be substitutes, complements, or even degrade each other, implying that defenders must account for the cyber weapons’ characteristics and the attacker’s profile and strategic behavior. We derive the optimal number of detectors when the attacker’s R&D process features R&D spillovers and show that targeted detectors act as deterrents against high-quality weapons only if the attacker’s budget is not substantial. Finally, we demonstrate that common cybersecurity practices may be detrimental from a social-welfare perspective by enhancing an arms race with the attacker.
Key Words R&D  Detectors  Cyber Weapons  APT  Sequential Game  Advanced cyber-attacks 
        Export Export