SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(SAMHÄLLSVETENSKAP) hsv:(Annan samhällsvetenskap) "

Sökning: hsv:(SAMHÄLLSVETENSKAP) hsv:(Annan samhällsvetenskap)

  • Resultat 39721-39730 av 51815
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
39721.
  • Hus mot himlen - Hållbar hybris?
  • 2018
  • Samlingsverk (redaktörskap) (övrigt vetenskapligt/konstnärligt)abstract
    • Höghus och skyskrapor väcker ofta mer debatt än andra byggnader. Varför? Hur välgrundat kan höghusen tillskrivas vissa egenskaper och negativ eller positiv påverkan på omgivningen? Hur mycket handlar det snarare om känslor och estetiska eller politiska ställningstaganden? I antologin Hus mot himlen – Hållbar hybris? skildras höghus och byggandet av dem utifrån vitt skilda perspektiv. I sexton kapitel belyser en bred skara forskare och praktiker höghusen som fenomen och ingrediens i stadsmiljön utifrån arkitektoniska, naturvetenskapliga och ingenjörsmässiga perspektiv, i planeringsprocesser och i diskussioner i media. Några artiklar är spekulativa och inspirerade av film och virtuella världar medan andra sätter höghusbyggandet i relation till dagens samhälle. Det är framför allt svenska exempel på höghusprojekt som beskrivs, även om många internationella utblickar presenteras.
  •  
39722.
  • Huse, Morten, et al. (författare)
  • Corporate innovation and competitive environment
  • 2005
  • Ingår i: International Entrepreneurship and Management Journal. - New York : Kluwer Academic Publishers. - 1554-7191 .- 1555-1938. ; 1:3, s. 313-333
  • Tidskriftsartikel (refereegranskat)abstract
    • Empirical studies have shown that the characteristics of the competitive environment influence the corporate innovation activities of U.S. firms. This study attempts to internationalize these studies in two ways. First, it examines the environment-corporate innovation relationship in Norwegian manufacturing firms. Second, it examines how the firms’ corporate innovation activities are influenced by their international activities. Results indicate that environment and internationalization are positively related to corporate innovation, but models developed using U.S. firms may not be generalizable to firms from other countries.
  •  
39723.
  •  
39724.
  • Huser, Brian (författare)
  • Sustainable lake restoration: From challenges to solutions
  • 2024
  • Ingår i: WIREs Water. - 2049-1948. ; 11
  • Tidskriftsartikel (refereegranskat)abstract
    • Sustainable management of lakes requires us to overcome ecological, economic, and social challenges. These challenges can be addressed by focusing on achieving ecological improvement within a multifaceted, co-beneficial context. In-lake restoration measures may promote more rapid ecosystem responses than is feasible with catchment measures alone, even if multiple interventions are needed. In particular, we identify restoration methods that support the overarching societal target of a circular economy through the use of nutrients, sediments, or biomass that are removed from a lake, in agriculture, as food, or for biogas production. In this emerging field of sustainable restoration techniques, we show examples, discuss benefits and pitfalls, and flag areas for further research and development. Each lake should be assessed individually to ensure that restoration approaches will effectively address lake-specific problems, do not harm the target lake or downstream ecosystems, are cost-effective, promote delivery of valuable ecosystem services, minimize conflicts in public interests, and eliminate the necessity for repeated interventions. Achieving optimal, sustainable results from lake restoration relies on multidisciplinary research and close interactions between environmental, social, political, and economic sectors. This article is categorized under: Science of Water > Water Quality Water and Life > Stresses and Pressures on Ecosystems Water and Life > Conservation, Management, and Awareness
  •  
39725.
  • Huskaj, Gazmend, et al. (författare)
  • An anticipatory ethical analysis of offensive cyberspace operations
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading : Academic Conferences and Publishing International Limited. - 9781912764525 - 9781912764532 - 1912764539 ; , s. 512-520
  • Konferensbidrag (refereegranskat)abstract
    • This article presents the ethical issues using offensive cyberspace operations. Previously enshrouded in secrecy, and now becoming the new norm, countries are using offensive cyberspace operations to achieve their strategic interests. Russia has conducted multiple offensive operations targeting Estonia, Georgia and the Ukraine; Hamas has targeted Israeli targets; and Iran has been targeting U.S. targets. The response to these operations has varied; Estonia and Georgia struggled with the attacks and were unable to respond while Ukraine tried to respond but the response was inefficient. Israel's response on Hamas offensive operations was an air strike on a building with Hamas Cyber-operatives. Iran shot down a U.S. Drone over the Strait of Hormuz, and the U.S. initially intended to respond with kinetic capabilities in the form of missile strikes. However, in the last minute, the U.S. chose to respond with offensive cyberspace operations targeting the Iranian missile systems. This last-minute change of response choosing between kinetic or cyber capabilities shows a need to further investigate how offensive cyberspace operations can be used against which targets from an ethical perspective. This article applies anticipatory ethical analysis on U.S. offensive operations in the “Global Hawk”-case when Iran shot down a U.S. drone over the Strait of Hormuz. Anticipatory ethical analysis looks at emerging technologies and their potential consequences. Offensive cyberspace operations present a range of possibilities, which include lowering the risk of harm to cyber operatives' lives belonging to the responding nation. However, a response can also be kinetic. Therefore, the analysis of the “Global Hawk”-case is compared with the Israeli-air strike of the building of Hamas Cyber-operatives. The authors argue that applying anticipatory ethical analysis on offensive operations and kinetic operations assist decision makers in choosing response actions to re-establish deterrence through the use of offensive cyberspace operations. 
  •  
39726.
  • Huskaj, Gazmend, et al. (författare)
  • Anticipatory ethics for vulnerability disclosure
  • 2020
  • Ingår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020. - Reading : Academic Conferences and Publishing International Limited. - 9781912764525 - 1912764539 - 9781912764532 ; , s. 254-261
  • Konferensbidrag (refereegranskat)abstract
    • This article presents the ethical dilemma related to under what circumstances vulnerabilities should be disclosed. Vulnerabilities exist in hardware and software, and can be as a consequence of programming errors or design flaws. Threat actors can exploit these vulnerabilities to gain otherwise unintended access to information systems, resources and/or stored information. In other words, they can be used to impact the confidentiality, integrity and availability of information in information systems. As a result, various types of vulnerabilities are highly sought after since they enable this type of access. The most highly sought are so-called “zero-day”-vulnerabilities. These are vulnerabilities that exist but are unknown, and when exploited, enable one way of entry into a system that is not thought possible. This is also why zero-day vulnerabilities are very popular among criminal organizations, states and state-sponsored advanced persistent threats. The other side of the coin is when a state identifies a zero-day, and ends up in the ethical dilemma of whether to release the news and inform the vendor to patch it, i.e. close the vulnerability, or to use it for offensive or intelligence purposes. This article employs these distinctions to apply anticipatory ethics in the Stuxnet-case. Stuxnet was a computer software that was allegedly developed by the U.S. together with Israel to disrupt Iran's development of uranium for their nuclear program. More exactly, it was developed to disable the uranium centrifuges used to enrich uranium. To achieve this, Stuxnet exploited four zero-day vulnerabilities and, according to some experts, managed to delay Iran's nuclear program by one to two-years, forcing them to the negotiation table. Using vulnerabilities like zero-days presents opportunities but also risks. The results of the application of anticipatory ethics to the Stuxnet case are then compared with the “Osirak”-case and the “al-Kibar”-case. Osirak was the nuclear reactor in Iraq and was bombed in 1981; al-Kibar was the nuclear reactor being built up in Syria, also bombed in 2007. 
  •  
39727.
  • Huskaj, Gazmend, et al. (författare)
  • Cyber Deterrence : An Illustration of Implementation
  • 2018
  • Ingår i: 13th International Conference on Cyber Warfare and Security (ICCWS 2018). - Sonning : Academic Conferences and Publishing International Limited. - 9781911218746 - 9781911218739 ; , s. 304-311
  • Konferensbidrag (refereegranskat)abstract
    • Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. However, several issues exist when implementing cyber deterrence, which are identified in this paper. The findings show (1) non-existence of the deterrence strategy  (2) no doctrine or decision competence to retaliate to an adversary, (3) the armed forces have no authority to retaliate when Swedish sovereignty in Cyberspace is threatened, (4) no norms or regulations exist concerning retaliation, (5) no clear governance on using offensive cyber capabilities, and finally, (6) no credibility in its cyber deterrence posture regarding how much Sweden is willing to sacrifice to protect its electoral system, which is a Swedish national interest. Therefore, this research investigates how cyber deterrence can practically be implemented in Swedish cyber security policy. So far, researchers generally focused on the human aspect of cyber deterrence. By using the case study research strategy and utilizing the Swedish electoral system as a case, this paper examines possibilities to merge the human dimensions of cyber security with the technological dimensions. Data collection is performed through documents studies and semi-structured interviews with experts in the area to identify cyber deterrence components. Further, a mathematical approach is discussed in the paper to express the relationship between an adversary and a deterrent depicting each of the actor’s risk calculus. A result of the research work performed in this paper, the deterrence components for Swedish cyber deterrence are proposed and risk calculus is performed. Moreover, measures to increase Swedish cyber deterrence posture are proposed the practical implementation of cyber deterrence in Swedish cyber security policy in order to deter attacks on the Swedish electoral system is demonstrated.
  •  
39728.
  • Huskaj, Gazmend, et al. (författare)
  • Designing attack infrastructure for offensive cyberspace operations
  • 2020
  • Ingår i: Proceedings of the 19th European Conference on Cyber Warfare and Security. - Reading, UK : Academic Conferences and Publishing International Limited. - 9781912764617 - 9781912764624 ; , s. 473-482
  • Konferensbidrag (refereegranskat)abstract
    • This article addresses the question ‘what considerations should be taken by cyber commands when designing attack infrastructure for offensive operations?’. Nation-states are investing in equipping units tasked to conduct offensive cyberspace operations. Generating ‘deny, degrade, disrupt, destroy or deceive’ effects on adversary targets requires to move from own (‘green’), through neutral (‘grey’), to adversary (‘red’) cyberspace. The movement is supported by attack infrastructure for offensive cyberspace operations. In this paper, we review the professional and scientific literature identifying the requirements for designing an attack infrastructure. Next, we develop and define the concepts for attack infrastructure. Finally, we explain and describe the considerations for designing attack infrastructure. The research question is answered by proposing a framework for designing attack infrastructure. This framework is vital for military and civilian commands designing attack infrastructure for offensive cyberspace operations. 
  •  
39729.
  • Huskaj, Gazmend, 1978- (författare)
  • Offensive Cyberspace Operations : Implications for Sweden
  • 2024
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This PhD thesis describes how Sweden can organise its offensive cyberspace capabilities for strategic objectives, including cyber deterrence and defence, in response to escalating threats from nations like Russia, China, and Iran. The research develops a multi-level and multi-domain (MLMD) theoretical framework, integrating deterrence theory, intelligence the- ory, and offensive cyberspace operations. Adopting an interpretivist research philosophy, the research employs a case study research strategy, reviewing scientific and military literature and conducting semi-structured interviews with key respondents in Swedish policy and defence. The findings suggest the need for a comprehensive national deterrence strategy encompassing offensive cyberspace capabilities, the operational organisation of cyberspace units supported by policy and intelligence, and a tactical emphasis on identifying and exploiting zero-day vulnerabilities. This research contributes to the field by offering models and frameworks for planning and executing offensive cyberspace operations, providing insights and increasing the knowledge base for professionals and researchers. Additionally, it advances the field by applying the MLMD framework for evaluating the research papers and using the general method for theory building in applied disciplines to assess the utility of the proposed model for offensive cyberspace operations.
  •  
39730.
  • Huskaj, Gazmend, et al. (författare)
  • Offensive Cyberspace Operations and Zero-days : Anticipatory Ethics and Policy Implications for Vulnerability Disclosure
  • 2020
  • Ingår i: Journal of Information Warfare. - 1445-3312. ; 20:1, s. 96-109
  • Tidskriftsartikel (refereegranskat)abstract
    • This article addresses the question under which circumstances zero-day vulnerabilities should be disclosed or used for offensive cyberspace operations. Vulnerabilities exist in hardware and software and can be seen as a consequence of programming errors or design flaws. The most highly sought are so-called zero-day-vulnerabilities. These vulnerabilities exist but are unknown and, when exploited, enable one way of entry into a system that is otherwise not thought possible. Therefore, from an anticipatory ethics perspective, it is important to understand in what cases zero-days should be disclosed or not.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 39721-39730 av 51815
Typ av publikation
tidskriftsartikel (19432)
bokkapitel (10762)
konferensbidrag (8472)
rapport (4629)
bok (1719)
doktorsavhandling (1622)
visa fler...
annan publikation (1565)
samlingsverk (redaktörskap) (1541)
recension (1153)
forskningsöversikt (451)
licentiatavhandling (278)
proceedings (redaktörskap) (166)
konstnärligt arbete (86)
patent (2)
visa färre...
Typ av innehåll
refereegranskat (24150)
övrigt vetenskapligt/konstnärligt (23340)
populärvet., debatt m.m. (4311)
Författare/redaktör
Hearn, Jeff, 1947- (383)
Munthe, Christian, 1 ... (234)
Rosenberg, Tiina (228)
Gössling, Stefan (196)
Lykke, Nina, 1949- (185)
Kylhammar, Martin, 1 ... (159)
visa fler...
Mulinari, Diana (157)
Dahlgaard-Park, Su M ... (141)
Söderbaum, Fredrik, ... (140)
Pramling Samuelsson, ... (138)
Mont, Oksana (132)
Åsberg, Cecilia, 197 ... (129)
Corvellec, Hervé (127)
Lohm, Ulrik, 1943- (123)
Dellve, Lotta, 1965 (113)
Larsson, Per-Olof, 1 ... (113)
Winkel, Jörgen, 1946 (112)
Mccormick, Kes (110)
Lundälv, Jörgen, 196 ... (108)
Thynell, Marie (106)
Svensson, Marina (104)
Balkmar, Dag, 1974- (103)
Palm, Jenny, 1973- (100)
Hultman, Johan (100)
Lilja, Mona, 1971- (97)
Nordberg, Marie (97)
Öjendal, Joakim, 196 ... (96)
Weibull, Lennart, 19 ... (94)
Dahlstedt, Magnus, 1 ... (90)
Rauhut, Daniel, 1968 ... (88)
Jonsson, Stefan, 196 ... (87)
Johansson, Eva, 1949 (87)
Karlsson, MariAnne, ... (87)
Karlsson, Jan Ch (85)
Dahl, Ulrika, 1970- (84)
Rydström, Helle (84)
Gottzén, Lucas, 1977 ... (83)
Gunnarsson, Lena, 19 ... (83)
Aronsson, Karin, 194 ... (82)
Strid, Sofia, 1976 (82)
Liinason, Mia (79)
Ek, Richard (79)
Wamsler, Christine (79)
Berg, Stig (78)
Gonäs, Lena (76)
Säljö, Roger, 1948 (76)
Berndtsson, Ronny (74)
Rahm, Lars, 1948- (74)
Jonsson, Inger M., 1 ... (74)
Gillberg, Gunnar, 19 ... (74)
visa färre...
Lärosäte
Göteborgs universitet (11770)
Lunds universitet (8418)
Linköpings universitet (7027)
Uppsala universitet (4058)
Stockholms universitet (3279)
Chalmers tekniska högskola (2673)
visa fler...
Örebro universitet (2305)
Karlstads universitet (2235)
Umeå universitet (1988)
Kungliga Tekniska Högskolan (1971)
Linnéuniversitetet (1533)
Södertörns högskola (1423)
Sveriges Lantbruksuniversitet (1143)
Malmö universitet (1099)
Mittuniversitetet (1054)
Högskolan i Borås (1005)
Jönköping University (966)
Försvarshögskolan (945)
Mälardalens universitet (932)
Högskolan i Halmstad (604)
Högskolan i Gävle (598)
Nordiska Afrikainstitutet (537)
Högskolan Dalarna (522)
Högskolan Väst (457)
Luleå tekniska universitet (430)
Karolinska Institutet (390)
Marie Cederschiöld högskola (364)
Högskolan Kristianstad (281)
VTI - Statens väg- och transportforskningsinstitut (257)
RISE (256)
Blekinge Tekniska Högskola (241)
Handelshögskolan i Stockholm (211)
Högskolan i Skövde (188)
Gymnastik- och idrottshögskolan (111)
IVL Svenska Miljöinstitutet (64)
Riksantikvarieämbetet (49)
Konstfack (42)
Röda Korsets Högskola (40)
Naturvårdsverket (31)
Enskilda Högskolan Stockholm (19)
Havs- och vattenmyndigheten (10)
Institutet för språk och folkminnen (10)
Stockholms konstnärliga högskola (6)
Sophiahemmet Högskola (3)
Naturhistoriska riksmuseet (2)
Kungl. Musikhögskolan (2)
Kungl. Konsthögskolan (1)
visa färre...
Språk
Engelska (34563)
Svenska (15876)
Tyska (284)
Danska (188)
Spanska (171)
Franska (134)
visa fler...
Norska (114)
Polska (91)
Finska (66)
Italienska (51)
Japanska (38)
Portugisiska (32)
Odefinierat språk (29)
Turkiska (29)
Ryska (28)
Arabiska (25)
Kinesiska (24)
Tjeckiska (11)
Estniska (11)
Nederländska (7)
Persiska (6)
Rumänska (5)
Koreanska (5)
Isländska (4)
Ukrainska (4)
Serbiska (3)
Bosniska (3)
Ungerska (2)
Bokmål (2)
Nygrekiska (1)
Lettiska (1)
Kroatiska (1)
Litauiska (1)
Mongoliskt språk (1)
Indonesiska (1)
Vietnamesiska (1)
Annat språk (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Samhällsvetenskap (51770)
Humaniora (5584)
Medicin och hälsovetenskap (2953)
Teknik (2840)
Naturvetenskap (2406)
Lantbruksvetenskap (774)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy