Developing Cyber Peacekeeping: Observation, Monitoring and Reporting

06/07/2018
by   Michael Robinson, et al.
0

Cyber peacekeeping is an emerging and multi-disciplinary field of research, touching upon technical, political and societal domains of thought. In this article we build upon previous works by developing the cyber peacekeeping activity of observation, monitoring and reporting. We take a practical approach: describing a scenario in which two countries request UN support in drawing up and overseeing a ceasefire which includes cyber terms. We explore how a cyber peacekeeping operation could start up and discuss the challenges it will face. The article makes a number of proposals, including the use of a virtual collaborative environment to bring multiple benefits. We conclude by summarising our findings, and describing where further work lies.

READ FULL TEXT

page 4

page 6

page 8

page 9

page 12

page 13

page 15

research
10/26/2017

An Introduction to Cyber Peacekeeping

Peacekeeping is a noble and essential activity, helping to bring peace t...
research
02/19/2019

Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement

Cybercrime investigators face numerous challenges when policing online c...
research
12/31/2018

Developing Cyber Buffer Zones

The United Nations conducts peace operations around the world, aiming to...
research
09/27/2020

From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?

In Cyberspace nowadays, there is a burst of information that everyone ha...
research
01/20/2022

Correcting for Reporting Delays in Cyber Incidents

With an ever evolving cyber domain, delays in reporting incidents are a ...
research
03/15/2021

Classroom Technology Deployment Matrix: A Planning, Monitoring, Evaluating and Reporting Tool

We present the Classroom Technology Deployment Matrix (CTDM), a tool for...
research
04/14/2020

Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies

Studies in socio-technical aspects of security often rely on user studie...

Please sign up or login with your details

Forgot password? Click here to reset