October 3, 2016
Posted by: jlbeyer
Extremist use of information and communications technology (ICT) has proliferated, creating a unique security predicament for the companies who provide ICT products and services internationally. As the role of ICT
September 12, 2016
Posted by: jlbeyer
The e-commerce industry has been rapidly growing in India. The distinct constraints and opportunities of the Indian context has shaped how e-commerce has developed, with online retailers having to address
June 28, 2016
Posted by: jlbeyer
North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.
June 21, 2016
Posted by: jlbeyer
The closeness of China and Russia’s cybersecurity relationship is not dependent on their ties with each other, but is defined in relation to the US. Instead of augmenting the trust or preventing cyber-espionage between the two countries, Sino-Russian cybersecurity cooperation is a strategic move to challenge US dominance over the Internet.
April 4, 2016
Posted by: jlbeyer
The Association of Southeast Asian Nations (ASEAN) member countries have emerged among the world’s leading economies. The member states—Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar (Burma), Philippines, Singapore, Thailand, and Vietnam—have