Developing Cyber Peacekeeping: Observation, Monitoring and Reporting
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing their national infrastructure. Cyber peacekeeping is one such solution: an emerging and multi-disciplinary field of research, touching upon technical, political, governmental and societal domains of thought. In this article we build upon previous works by developing the cyber peacekeeping activity of observation, monitoring and reporting. We take a practical approach: describing a scenario in which two cyberphysical societies experience the negative effects of cyber warfare and require cyber expertise to restore services their citizens depend upon. We explore how a cyber peacekeeping operation could start up and discuss the challenges it will face. The article makes a number of proposals, including the use of a virtual collaborative environment to bring multiple benefits. We conclude by summarising our findings, and describing where further work lies.
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.
Citation : Robinson, M., Jones, K., Janicke, H. and Maglaras, L. (2018) Developing Cyber Peacekeeping: Observation, Monitoring and Reporting. Journal of Government Information Quarterly,
Research Group : Cyber Technology Institute
Research Institute : Cyber Technology Institute (CTI)
Peer Reviewed : Yes
Showing items related by title, author, creator and subject.
Qabajeh, Issa Mohammad (Thesis or dissertation / Doctoral / PhD)Data mining is the process of discovering useful patterns from datasets using intelligent techniques to help users make certain decisions. A typical data mining task is classification, which involves predicting a target ...
Nicholson, Andrew (Thesis or dissertation / Doctoral / PhD)Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click crimeware kits are widely circulated ...