Conflict & Conflict Resolution

8 Items

3D rendering of cyber security and system crash

Adobe Stock

Analysis & Opinions - Harvard Business Review

The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict

With the looming threat of increased conflict in Ukraine, businesses around the world should be preparing now, write Paul R. Kolbe, Maria Robson Morrow, and Lauren Zabierek. Corporate security and intelligence teams have said they’re seeing an increase in cyber probes, and the U.S. Cybersecurity and Infrastructure Security Agency and the European Central Bank have both issued warnings about potential Russian cyberattacks. At this point, companies should be taking the following steps: 1) Review business continuity plans; 2) Closely examine supply chains; 3) Actively engage peer networks, vendors, and law enforcement around cyber intrusions; 4) Instill a security mindset in employees; and 5) Make sure corporate intelligence and IT teams are working closely together on solutions.

Donald Trump is greeted by Kurt Heise, left, Supervisor of Plymouth Township, Mich., and Speaker Lee Chatfield, of the Michigan House of Representatives

AP/Alex Brandon, File

Analysis & Opinions - The New York Times

What Makes Trump's Subversion Efforts So Alarming? His Collaborators

| Nov. 23, 2020

Henry J. Farrell and Bruce Schneier detail how Americans' shared beliefs about democracy can break down when political insiders make bogus claims about general fraud, trying to cling to power when the election has gone against them.

Joe Biden

AP/Matt Slocum

Analysis & Opinions - Project Syndicate

After the Liberal International Order

| July 06, 2020

If Joe Biden defeats Donald Trump in November, the question he will face is not whether to restore the liberal international order. It is whether the United States can work with an inner core of allies to promote democracy and human rights while cooperating with a broader set of states to manage the rules-based international institutions needed to face transnational threats.

A cyber threat map adorns a wall of the Cyber Security Operations Center at AEP headquarters in Columbus, Ohio on Wednesday, May 20, 2015.

AP Photo/John Minchillo

Analysis & Opinions - Foreign Affairs

Battlefield Internet: A Plan for Securing Cyberspace

| September/October 2018

The Internet has always been much more than a venue for conflict and competition; it is the backbone of global commerce and communication. That said, cyberspace is not, as is often thought, simply part of the global commons in the way that the air or the sea is. States assert jurisdiction over, and companies claim ownership of, the physical infrastructure that composes the Internet and the data that traverses it. States and companies built the Internet, and both are responsible for maintaining it. Actions taken in the public sector affect the private sector, and vice versa. In this way, the Internet has always been hybrid in nature. 

So, accordingly, is the real cyberwar threat.

Analysis & Opinions - The Australian

The Information Revolution Gets Political

| February 11, 2013

"Beneath the Arab political revolutions lies a deeper and longer process of radical change that is sometimes called the information revolution. We cannot yet fully grasp its implications, but it is fundamentally transforming the nature of power in the twenty-first century, in which all states exist in an environment that even the most powerful authorities cannot control as they did in the past."

Protesters gather at Gani Fawehinmi Park as a national strike over fuel prices and government corruption entered its 2nd day in Lagos, Nigeria, Jan. 10, 2012. Angry youths erected a burning roadblock outside luxury enclaves in Nigeria's commercial capital

AP Photo

Analysis & Opinions - The Guardian

Roads and Rail in Nigeria Could Be at the Centre of Job Creation

| January 24, 2012

"...[N]ew jobs can be directly created in the design, construction, operation and maintenance of infrastructure projects. However, such job creation is unlikely to happen unless there are deliberate policy guidelines. This is mainly because construction projects tend to focus primarily on immediate cost-effectiveness and less on indirect benefits such as youth employment."

Norton Cybercrime Index

AP Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Taking a Byte Out of Cybercrime

| October 2011

"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."