Search results for "kyberavaruus"
showing 10 items of 12 documents
Cyber warfare : the game changer in the battlespace
2022
A recent development in warfare has been the integration of Electronic Warfare (EW), Information Warfare (IW) and Cyber Warfare (CW) systems designed to generate non-kinetic effects in battle space together with the traditional use of kinetic weapons. These new capacities of armed forces create new possibilities to achieve the goals of war. These advanced and new capabilities form a whole new non-kinetic environment in which they have become a game changer in battle space. This article focuses on describing cyber warfare and the first experiences of the war in Ukraine. nonPeerReviewed
Protecting the besieged cyber fortress : Russia’s response to cyber threats
2019
The Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can be information-psychological (i.e., when the adversary tries to influence a person’s mind) or information-technical (i.e., when the object of influence is the information infrastructure). The information infrastructure of the RF is a combination of information systems, websites, and communication networks located in the territory of the RF, or those used as part of international treaties signed by the RF. A cyber threat is an illegal penetration or threat of penetration by…
Kuka kirjoittaa pilvi-imperiumien pelisäännöt?
2023
Cyberspace from the hybrid threat perspective
2013
Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are or likely will be relevant to the military community. peerReviewed
Tilannekuvatieto kriittisen infrastruktuurin yrityksen tietojärjestelmien tietoturvallisuudesta
2018
Kyberin taskutieto maatiloille
2018
On the aestheticization of technologized bodies : a portrait of a cyborg(ed) form of agency
2017
Discussions revolving around cyborgs seldom include aesthetics, let alone propose aesthetics as an inextricable part of the phenomenon of the cyborg. Rather, the term “cyborg”, a contraction of “cybernetic organism”, evokes a figure of the (hu)man- machine. In the field of social and political sciences, the cyborg is designated a human-machine hybrid, a metaphor of humans becoming machinelike, or a portrait of (political) agency in an era of high technology. These approaches promote a figure of technologized bodies, that is, the cyborg as a figure of technologically dominated and altered bodies. I will sustain that the cyborg contributes to our understanding of agency in the age of high tec…
Kybersodan analysointia
2017
Tämä tutkielma on kirjallisuuskatsaus, johon lähteinä on käytetty pääasiassa tieteellisiä artikkeleita ja kirjoja. Tutkielman tarkoituksena on perehtyä kybersodan käsitteeseen ja sen käyttötapoihin sekä siihen, onko kybersotaa olemassa. Käsitteen moderniuden johdosta sen määritelmät eroavat tutkijasta ja lähteestä riippuen huomattavasti toisistaan, mutta tutkielmaan onnistuttiin löytämään suhteellisen kattava kuva kybersodasta. This thesis is a literature review that is based mainly on scholarly articles and books. The purpose of this study is to familiarize with the concept of cyberwar and way of using the term, and consider the existence of cyberwar. In consequence of the modernity of the…
“This Is the Future of Advertising!” Or Is It? New Insights into the Justifiability of Deceptive Crowdwork in Cyberspace
2022
Unlike classical forms of deception where the deceiver deceives their victims directly, the crowdsourcing of cyber deception provides a powerful and cost-effective mechanism for deceivers to create and spread falsehood from the shadows. But for a mass deception campaign to be effective, the crowdworkers must rationalize (and willingly accept) their role in the deceptive act. What, then, could justify participation in a mass-deception campaign? To answer this question, we adopt the qualitative vignette approach and utilize neutralization theory as our guiding lens. Our results point to several neutralization techniques that crowdworkers could invoke to convincingly rationalize involvement in…