메뉴 건너뛰기




Volumn 33, Issue 4, 2013, Pages 299-310

The future of cyber-resilience in an age of global complexity

Author keywords

Cyber war; Resilience; Security; Stuxnet; Surveillance

Indexed keywords

INFORMATION TECHNOLOGY; INTERNET; LEGAL SYSTEM; NATIONAL SECURITY;

EID: 84887113097     PISSN: 02633957     EISSN: 14679256     Source Type: Journal    
DOI: 10.1111/1467-9256.12035     Document Type: Article
Times cited : (28)

References (44)
  • 3
    • 3042745793 scopus 로고    scopus 로고
    • The Weakest Link Revisited
    • Arce, I. (2003) 'The Weakest Link Revisited', IEEE Security and Privacy 1(2), pp. 72-76.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 72-76
    • Arce, I.1
  • 4
    • 84887052156 scopus 로고
    • 'Cyberwar is Coming!' RAND Corporation RP-223
    • Arquilla, J. and Ronfeldt, D. (1993) 'Cyberwar is Coming!' RAND Corporation RP-223.
    • (1993)
    • Arquilla, J.1    Ronfeldt, D.2
  • 5
    • 84887028499 scopus 로고    scopus 로고
    • BIS 'Cyber Security Guidance for Business', September. Available from: [Accessed 2 September 2013]
    • BIS (2011) 'Cyber Security Guidance for Business', September. Available from: http://www.bis.gov.uk/assets/biscore/business-sectors/docs/0-9/12-1120-10-steps-to-cyber-security-executive [Accessed 2 September 2013].
    • (2011)
  • 8
    • 84887080292 scopus 로고    scopus 로고
    • David Brin Rebuts Schneier in Defense of a Transparent Society
    • Wired News, 12 March
    • Brin, D. (2008) 'David Brin Rebuts Schneier in Defense of a Transparent Society', Wired News, 12 March.
    • (2008)
    • Brin, D.1
  • 9
    • 32144436898 scopus 로고    scopus 로고
    • EU Counterterrorism Policy: A Paper Tiger? Terrorism and Political
    • Bures, O. (2006) 'EU Counterterrorism Policy: A Paper Tiger? Terrorism and Political', Violence 18(1), pp. 57-78.
    • (2006) Violence , vol.18 , Issue.1 , pp. 57-78
    • Bures, O.1
  • 10
    • 84887100595 scopus 로고    scopus 로고
    • Government Cyber Crime Report Debunked
    • Tecweek Europe, 22 February
    • Curtis, S. (2011) 'Government Cyber Crime Report Debunked', Tecweek Europe, 22 February.
    • (2011)
    • Curtis, S.1
  • 11
    • 84857207287 scopus 로고    scopus 로고
    • Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War
    • Deibert, R.J., Rohozinski, R. and Crete-Nishihata, M. (2012) 'Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War', Security Dialogue 43(1), pp. 3-24.
    • (2012) Security Dialogue , vol.43 , Issue.1 , pp. 3-24
    • Deibert, R.J.1    Rohozinski, R.2    Crete-Nishihata, M.3
  • 12
    • 84901532492 scopus 로고
    • The (S)pace of International Relations: Simulation, Surveillance, and Speed
    • Der Derian, J. (1990) 'The (S)pace of International Relations: Simulation, Surveillance, and Speed', International Studies Quarterly 34(3), pp. 295-310.
    • (1990) International Studies Quarterly , vol.34 , Issue.3 , pp. 295-310
    • Der Derian, J.1
  • 13
    • 84887120838 scopus 로고    scopus 로고
    • Detica , The Cost of Cyber Crime: A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. Available from: [Accessed 2 September 2013]
    • Detica (2011) The Cost of Cyber Crime: A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf [Accessed 2 September 2013].
    • (2011)
  • 15
    • 84887030154 scopus 로고    scopus 로고
    • ENISA United Kingdom Country Report. Available from: [Accessed 23 June 2012]
    • ENISA (2012) United Kingdom Country Report. Available from: http://www.enisa.europa.eu/activities/stakeholder-relations/files/country-reports/UK.pdf [Accessed 23 June 2012].
    • (2012)
  • 16
    • 84887076821 scopus 로고    scopus 로고
    • Differing Views on Privacy Shape Europe's Response to US Surveillance Program
    • New York Times, 14 June
    • Erlanger, S. and Ewing, J. (2013) 'Differing Views on Privacy Shape Europe's Response to US Surveillance Program', New York Times, 14 June.
    • (2013)
    • Erlanger, S.1    Ewing, J.2
  • 17
    • 84887034727 scopus 로고    scopus 로고
    • Cybercrime Cost Estimate is "Sales Exercise", Say Experts
    • Znet, 18 February. Available from: [Accessed 2 September 2013]
    • Espiner, T. (2011) 'Cybercrime Cost Estimate is "Sales Exercise", Say Experts', Znet, 18 February. Available from: http://www.zdnet.com/cybercrime-cost-estimate-is-sales-exercise-say-experts-3040091866/ [Accessed 2 September 2013].
    • (2011)
    • Espiner, T.1
  • 18
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the Future of Cyber War
    • Farwell, J.P. and Rohozinski, R. (2011) 'Stuxnet and the Future of Cyber War', Survival 53(1), 23-40.
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.P.1    Rohozinski, R.2
  • 19
    • 84887114433 scopus 로고    scopus 로고
    • UK Perspectives on Security in an Age of "Shock and Aftershock"
    • Feakin, T. (2011) 'UK Perspectives on Security in an Age of "Shock and Aftershock"', European Perspectives on Security Research 1, pp. 45-45.
    • (2011) European Perspectives on Security Research , vol.1 , pp. 45-45
    • Feakin, T.1
  • 20
    • 84887082249 scopus 로고    scopus 로고
    • GCHQ Leading Fight against Cyber Crime
    • Gloucestershire Echo , 6 September
    • Gloucestershire Echo (2012) 'GCHQ Leading Fight against Cyber Crime', 6 September.
    • (2012)
  • 21
    • 33747876221 scopus 로고    scopus 로고
    • Brain-Machine Interfaces: Past, Present and Future
    • Lebedev, M.A. and Nicolelis, M.A. (2006) 'Brain-Machine Interfaces: Past, Present and Future', Trends in Neuroscience 29(9), pp. 536-546.
    • (2006) Trends in Neuroscience , vol.29 , Issue.9 , pp. 536-546
    • Lebedev, M.A.1    Nicolelis, M.A.2
  • 22
    • 33845501377 scopus 로고    scopus 로고
    • Microchipping People: The Rise of the Electrophorus
    • Michael, K. and Michael, M.G. (2005) 'Microchipping People: The Rise of the Electrophorus', Quadrant 49(3), pp. 22-33.
    • (2005) Quadrant , vol.49 , Issue.3 , pp. 22-33
    • Michael, K.1    Michael, M.G.2
  • 23
    • 84887076117 scopus 로고
    • Ministry of Defence 'Working Group on Testing of Computer Security', 1976/7 (D/DCCIS/56/8/5/4), DEFE68/287, TNA
    • Ministry of Defence (1976) 'Working Group on Testing of Computer Security', 1976/7 (D/DCCIS/56/8/5/4), DEFE68/287, TNA.
    • (1976)
  • 25
    • 84887109871 scopus 로고    scopus 로고
    • Why the Cabinet Office's £27bn Cyber Crime Cost Estimate is Meaningless'. Available from: [Accessed October 2011]
    • Moore, T. (2011) 'Why the Cabinet Office's £27bn Cyber Crime Cost Estimate is Meaningless'. Available from: http://www.lightbluetouchpaper.org/2011/02/17/why-the-cabinet-offices-27bn-cyber-crime-cost-estimate-is-meaningless/ [Accessed October 2011].
    • (2011)
    • Moore, T.1
  • 26
    • 84887103089 scopus 로고    scopus 로고
    • National Audit Office 'Cabinet Office Performance Briefing: Briefing for the House of Commons Public Administration Select Committee', October. Available from: [Accessed 2 September 2013]
    • National Audit Office (2009) 'Cabinet Office Performance Briefing: Briefing for the House of Commons Public Administration Select Committee', October. Available from: http://www.parliament.uk/documents/upload/cabinetofficeperform20091.pdf [Accessed 2 September 2013].
    • (2009)
  • 27
    • 84887087077 scopus 로고    scopus 로고
    • National Audit Office , 11 February, London: The Stationery Office. Available from: [Accessed 2 September 2013]
    • National Audit Office (2013) The UK Cyber Security Strategy: Landscape Review, Report by the Comptroller and Auditor General, 11 February, London: The Stationery Office. Available from: http://www.nao.org.uk/wp-content/uploads/2013/03/Cyber-security-Full-report.pdf [Accessed 2 September 2013].
    • (2013) The UK Cyber Security Strategy: Landscape Review, Report by the Comptroller and Auditor General
  • 28
    • 84887029162 scopus 로고    scopus 로고
    • Titan Rain: How Chinese Hackers Targeted Whitehall
    • The Guardian, 5 September
    • Norton-Taylor, R. (2010) 'Titan Rain: How Chinese Hackers Targeted Whitehall', The Guardian, 5 September.
    • (2010)
    • Norton-Taylor, R.1
  • 29
    • 84887057257 scopus 로고    scopus 로고
    • The State of the Internet in Cuba', unpublished research paper, som.csudh.edu/fac/lpress/cuba/chapters/lpdraft2.docx?.
    • Press, L. (2011) 'The State of the Internet in Cuba', unpublished research paper, som.csudh.edu/fac/lpress/cuba/chapters/lpdraft2.docx?.
    • (2011)
    • Press, L.1
  • 30
    • 84981636215 scopus 로고
    • The Hollowing Out of the State: The Changing Nature of the Public Service in Britain
    • Rhodes, R.A.W. (1994) 'The Hollowing Out of the State: The Changing Nature of the Public Service in Britain', Political Quarterly 65, pp. 138-151.
    • (1994) Political Quarterly , vol.65 , pp. 138-151
    • Rhodes, R.A.W.1
  • 31
    • 84858221367 scopus 로고    scopus 로고
    • Cyber War Will Not Take Place
    • Rid, T. (2012) 'Cyber War Will Not Take Place', Journal of Strategic Studies 35(1), pp. 5-32.
    • (2012) Journal of Strategic Studies , vol.35 , Issue.1 , pp. 5-32
    • Rid, T.1
  • 32
    • 84887063717 scopus 로고    scopus 로고
    • The Myth of the "Transparent Society"
    • Wired News, 6 March. Available from: [Accessed 2 September 2013]
    • Schneier, B. (2008) 'The Myth of the "Transparent Society"', Wired News, 6 March. Available from: http://bakerinstitute.org/publications/ITP-pub-PlanksOfUSInternationalCyberPolicy-052112.pdf [Accessed 2 September 2013].
    • (2008)
    • Schneier, B.1
  • 33
    • 79958715204 scopus 로고    scopus 로고
    • Reducing Systemic Cybersecurity Risk
    • OECD/IFP Project on 'Future Global Shocks', 14 January. Available from: [Accessed 2 September 2013]
    • Sommer, P. and Brown, I. (2011) 'Reducing Systemic Cybersecurity Risk', OECD/IFP Project on 'Future Global Shocks', 14 January. Available from: http://www.oecd.org/internet/46894657.pdf [Accessed 2 September 2013].
    • (2011)
    • Sommer, P.1    Brown, I.2
  • 35
    • 84887036998 scopus 로고    scopus 로고
    • First Humans to Receive ID Chips; Technology: Device Injected under the Skin Will Provide Identification and Medical Information
    • Los Angeles Times, 9 May
    • Streitfield, D. (2002) 'First Humans to Receive ID Chips; Technology: Device Injected under the Skin Will Provide Identification and Medical Information', Los Angeles Times, 9 May.
    • (2002)
    • Streitfield, D.1
  • 38
    • 84887061894 scopus 로고    scopus 로고
    • UK Cabinet Office 'The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World', November. Available from: [Accessed 29 January 2012].
    • UK Cabinet Office (2011) 'The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World', November. Available from: http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf [Accessed 29 January 2012].
    • (2011)
  • 39
    • 84887107547 scopus 로고    scopus 로고
    • UK House of Commons 'Supplementary Written Evidence from the Ministry of Defence, Following the Private Evidence Session on 18 April 2012', HC106, Defence and Cyber-security, DCS 001a
    • UK House of Commons (2012) 'Supplementary Written Evidence from the Ministry of Defence, Following the Private Evidence Session on 18 April 2012', HC106, Defence and Cyber-security, DCS 001a.
    • (2012)
  • 40
    • 84867297056 scopus 로고    scopus 로고
    • Cybersecurity: A Pre-history
    • Warner, M. (2012) 'Cybersecurity: A Pre-history', Intelligence and National Security 27(5), pp. 781-799.
    • (2012) Intelligence and National Security , vol.27 , Issue.5 , pp. 781-799
    • Warner, M.1
  • 41
    • 84887033021 scopus 로고    scopus 로고
    • National Database Dropped but All Our Communications Will Still be Monitored
    • The Telegraph, 29 April
    • Whitehead, T. (2009) 'National Database Dropped but All Our Communications Will Still be Monitored', The Telegraph, 29 April.
    • (2009)
    • Whitehead, T.1
  • 42
    • 84887111154 scopus 로고    scopus 로고
    • Oral Statement to Parliament, UUK Conference: "A World without Boundaries" (BIS)', 13 September. Available from: [Accessed 2 September 2013]
    • Willetts, D. (2012) 'Oral Statement to Parliament, UUK Conference: "A World without Boundaries" (BIS)', 13 September. Available from: https://www.gov.uk/government/speeches/uuk-conference-a-world-without-boundaries [Accessed 2 September 2013].
    • (2012)
    • Willetts, D.1
  • 43
    • 84887058434 scopus 로고    scopus 로고
    • BT's Secret Phorm Trials Open Door to Corporate Eavesdropping: Government Bumbling Exposes Oversight Gap
    • The Register, 17 April. Available from: [Accessed 24 August 2012]
    • Williams, C. (2008) 'BT's Secret Phorm Trials Open Door to Corporate Eavesdropping: Government Bumbling Exposes Oversight Gap', The Register, 17 April. Available from: http://www.theregister.co.uk/2008/04/17/ripa_phorm_shambles/ [Accessed 24 August 2012].
    • (2008)
    • Williams, C.1
  • 44
    • 80053241335 scopus 로고    scopus 로고
    • Integrating Cyber Security into Nuclear Digital I&C Safety Systems', ASME Conference Proceedings 18th International Conference on Nuclear Engineering: Vol. 1/Instrumentation and Controls (ICONE18)
    • Zhang, D.J. (2010) 'Integrating Cyber Security into Nuclear Digital I&C Safety Systems', ASME Conference Proceedings 18th International Conference on Nuclear Engineering: Vol. 1/Instrumentation and Controls (ICONE18).
    • (2010)
    • Zhang, D.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.