Search Constraints
1 - 5 of 5
Number of results to display per page
Search Results
-
- Type:
- Dataset
- Description/Abstract:
- Varieties of International Cyber Strategies (VoICS): Text Analysis of National Cybersecurity Documents is a project that compares and contrasts the three main approaches to conceptualize national cybersecurity strategies (NSS): deterrence, norm-based approach (NBA) and cyber persistence engagement (CPE). Scholars and policymakers have initially conceptualized NSS in terms of deterrence or NBA. More recent academic research has demonstrated that these frameworks are inadequate for cyber space. As a result, Cyber Persistence Engagement (CPE) emerged as a third option. The first version (1.0) of the VoICS database on National Cybersecurity Strategies focuses on nations in Europe and North America and includes a total of 77 NCS of the states in the North Atlantic Area—NATO allies, EU members and Switzerland—released from 2003 until the end of 2023. It consists of 27 variables, including country and strategy identifiers, EU and NATO membership, their respective accession dates, and total length of the documents. VoICS include eighteen variables representing different measures of relative and absolute weights of the three NSS types—deterrence, NBA and CPE. The text analysis is based on official NSS documents provided by the NATO Cooperative Cyber Defence Centre of Excellence library (2024) and ENISA’s interactive map for National Cyber Security Strategies (2023). Both sources rely on voluntary submission from the member states. Unfortunately, some official documents were not available or accessible or were not listed at all. Authors have used various sources and contacts with a variety of cyber attachés in Brussels to determine if any additional strategies were released and to obtain the missing documents. The 18 text analysis variables compare and contrast the extent to which different NCS are associated with a specific strategy. They represent different frequency scores based either on words, phrases, or words and phrases combined. These calculations are associated with either deterrence, NBA, or CPE in each strategy. The authors have generated respective vocabularies for the three strategic ideas through which each of these approaches are operationalized. We have conducted a text analysis using WordStat text analysis software by Provialis ( https://provalisresearch.com/products/content-analysis-software/). A detailed codebook for NSS Dataset 1.0 along with a NSS Dictionary 1.0 have been included in this collection/ repository. The process of generating vocabulary associated with the three cybersecurity approaches involved several steps. First, upon reviewing the literature, the authors generated independently a list of words and phrases associated with each type of cybersecurity strategy. Second, the authors compared their lists to determine the degree of overlap in vocabulary. Those words and phrases that included in at least two different lists were reviewed and, if there was consensus, were incorporated in the dictionary. Finally, words and phrases which were identified in only one of lists were once again reviewed and, in case there was a consensus among the authors, these were also included in the dictionary. Third, the three vocabularies were updated on several instances when it was unanimously agreed that these words or phrases should be included in the analysis.
- Creator/Author:
- Millard, Matthew; Kovac, Igor, and Ivanov, Ivan Dinev
- Submitter:
- Ivan Ivanov
- Date Uploaded:
- 05/12/2025
- Date Modified:
- 05/12/2025
- Date Created:
- 2025-04-18
- License:
- All rights reserved
-
- Type:
- Dataset
- Description/Abstract:
- Data and code for analysis of thermal constraints on flight for butterflies
- Creator/Author:
- Goff, Jennifer and Matter, Stephen F.
- Submitter:
- Stephen F. Matter
- Date Uploaded:
- 09/01/2024
- Date Modified:
- 09/01/2024
- Date Created:
- 2024-6
- License:
- Attribution-NonCommercial 4.0 International
-
- Type:
- Article
- Description/Abstract:
- This is part one of a mini-series attempting to grapple with US grand strategy and the potential need for its re-assessment. The goal of this series is to introduce readers to grand strategy, ideally prompting more to grapple with US grand strategy and grand strategy more broadly. The author is fleshing out their own ideas, so don’t take the work as gospel, but rather as a starting point for your own journey. In part one, an overview of the current state of US grand strategy is given. In part two, grand strategy is defined as a concept, a more detailed argument for the need of reassessment is put forth, and resources on grand strategy are listed for interested readers. In part three, four typologies of US grand strategic thought are summarized and contrasted with what US grand strategy has arguably been since the end of WWII. In part four, some general thoughts on the means and ends of reassessing US grand strategy will be described. Additional articles on grand strategy may appear over time.
- Creator/Author:
- Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 09/18/2021
- Date Modified:
- 09/18/2021
- Date Created:
- 2021-08-11
- License:
- Attribution 4.0 International
-
- Type:
- Dataset
- Description/Abstract:
- Theme Coded Literature Review - Does China's One-China Policy Shape China's Foreign Policy?
- Creator/Author:
- Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 07/23/2021
- Date Modified:
- 07/23/2021
- Date Created:
- 2019
- License:
- Open Data Commons Attribution License (ODC-By)
-
- Type:
- Student Work
- Description/Abstract:
- The purpose of this capstone was to organize and pursue the creation of a Dialogue in the Dark exhibition in Cincinnati. Dialogue in the Dark is an organization that, since 1988, has internationally utilized exhibits that allow visitors to be led through an hour long simulation of blindness as lead by a visually impaired guide through four pitch back simulated environments. The purpose of this exhibit is twofold. In an immediate sense it is meant to demonstrate to visitors that those who we often marginalize due to their disabilities are in fact quite capable, effectively serving as a platform to recognize, address, and overcome problems created by perceived "otherness". The larger lessons derive from experiencing a profoundly different reality than is normally accessible in terms of both the specific type of experience and the degree of contrast of realities it poses. Such jarring experiences open a brief window for dialogue. Drawing from actor-network theory, various principles and techniques from action research, and from fields such as organizational psychology, visual anthropology, and sociology, this capstone contains workable processes and objectives relevant to both the creation of a Cincinnati based Dialogue in the Dark and the framework for a Coalition for Community Action and Cooperation. These processes and objectives are to be constantly ongoing in development, and are only rudimentary in presentation style. Additionally, this project contains a reflection on both the process of bringing Dialogue in the Dark to Cincinnati thus far, a discussion of post-capstone plans for Dialogue in the Dark, and, in the spirit of demonstrating my BIS inspired work in general, a condensed introduction to my “Theory of Grand Irrationality” and my “Social Pulse Theory”, both of which are central starting points for the grad school experience I am both seeking and planning.
- Creator/Author:
- Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 06/18/2020
- Date Modified:
- 10/07/2020
- Date Created:
- 2014
- License:
- All rights reserved