Search Constraints
1 - 5 of 5
Number of results to display per page
Search Results
-
- Type:
- Dataset
- Description/Abstract:
- "Organizational Response to Emerging Threats" is a project that addresses three separate threat areas -- cybersecurity, peacekeeping and energy security. The data collection for cybersecurity and energy security has been completed. As of June 2019, the data collection for peacekeeping is ongoing. The project documents are organized around three topics, reflected in the filenames -- cybersecurity, peacekeeping and energy security. The overall purpose/rationale of this research project is to develop a framework that explains how different international organizations (IOs) respond to various emerging threats in international relations. These threats can vary and include cybersecurity, energy security, food security, environmental security, and others. For the purpose of our study we focus on two major variables explaining organizational response: (1) IOs’ capacity to acquire and deploy organizational assets (also referred to as asset fungibility), and; (2) IOs’ ability to make swift decisions in response to changing internal and external environments. Drawing from primary sources including interviews with NATO and EU officials, we suggest a new model explaining when organizations are better equipped at addressing cyber threats, when they have capacity to response more effectively, and what they could do to improve their organizational responses in this area. The QDR repository contains interviews with policy makers and senior bureaucrats conducted in 2016, 2017, 2018 and 2019 in Brussels, Belgium, and the Hague, the Netherlands. These interviews have been conducted in person or over skype. Approval to conduct interviews has been granted by the University of Cincinnati's IRB (Study ID: 2018-3371.
- Creator/Author:
- Ivanov, Ivan
- Submitter:
- Ivan Ivanov
- Date Uploaded:
- 10/20/2023
- Date Modified:
- 10/20/2023
- Date Created:
- 2019-07-22
- License:
- Attribution-ShareAlike 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Why do the majority of allegorical figures in art take on a female form? What does this tell us about the way women were viewed in their societies? This essay examines the relationship of the female form in allegorical prints and European Renaissance society in the 15th century.
- Creator/Author:
- King, Emilie
- Submitter:
- Emilie King
- Date Uploaded:
- 03/31/2022
- Date Modified:
- 04/26/2022
- Date Created:
- April 21, 2022
- License:
- All rights reserved
-
- Type:
- Article
- Description/Abstract:
- An overview of Walter A. McDougall's 1997 book "Promised Land, Crusader State: The American Encounter with the World Since 1776" with some concluding thoughts.
- Creator/Author:
- Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 10/10/2021
- Date Modified:
- 10/10/2021
- Date Created:
- 2021-10-08
- License:
- Attribution 4.0 International
-
- Type:
- Article
- Description/Abstract:
- The UK has created one of the best tools for mitigating Huawei’s risks. Whether or not the UK Huawei ban stands, its Huawei Cyber Security Evaluation Centre should receive increased funding and support to protect and enhance its interests at home and abroad.
- Creator/Author:
- Huang, Russell and Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 08/14/2020
- Date Modified:
- 08/14/2020
- Date Created:
- 2020-08-14
- License:
- Attribution-NonCommercial-ShareAlike 4.0 International
-
- Type:
- Document
- Description/Abstract:
- The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach. This article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.
- Creator/Author:
- Huang, Russell and Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 07/08/2020
- Date Modified:
- 07/08/2020
- Date Created:
- June 30, 2020
- License:
- Attribution-ShareAlike 4.0 International