<?xml version="1.0" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>'Cyber Security' - Tagged Articles - Inquiries Journal</title>
    <link>http://www.inquiriesjournal.com/keyword/cyber-security</link>
    <description>Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.</description>
    <language>en-us</language>
    <pubDate>Tue, 21 Apr 2026 09:45:10 -0400</pubDate>
    <lastBuildDate>Tue, 21 Apr 2026 09:45:10 -0400</lastBuildDate>
	
			<item>
				<title>Crossed Wires: International Cooperation on Cyber Security</title>
				<link>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</link>
				<description>By Madeline  Carr - Although cyber security is quite clearly a &amp;lsquo;post-state&#39; problem, it has actually proven very difficult to move beyond a Westphalian conception of either the problem or the possible solutions. This leads to a central paradox about cyber security as we currently conceive it: on the one hand, it appears to be a problem that cannot be dealt with effectively by state instruments like the military or law enforcement but despite that, there remains a strong expectation that the state retains responsibility for providing security in this realm. This paradox has led to an emphasis in cyber security...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</guid>
			</item>
			<item>
				<title>Book Review: &quot;Cyber War Will Not Take Place&quot;</title>
				<link>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</link>
				<description>By Justine  Chauvin - In Cyber War Will Not Take Place1, Thomas Rid develops his argument on the concept of &quot;cyberwar&quot;, previously formulated in an article of the same name2 published in January 2012. His chief point is that &quot;cyber war has never happened in the past, it does not occur in the present, and it is unlikely that it will disturb our future&quot;;3 ergo the use of this concept to describe cyberoffenses is misleading.4 He has also written several articles related to cyberwar5, cyberweapons6 and cyberpeace,7 in which he argues against the militarization of the debate about cyberattacks,8 and in particular the confusing...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</guid>
			</item>
			<item>
				<title>Stuxnet: The World&#39;s First Cyber... Boomerang?</title>
				<link>http://www.inquiriesjournal.com/articles/1343/stuxnet-the-worlds-first-cyber-boomerang</link>
				<description>By Alex  Middleton - In June 2012, two years after the initial discovery of the Stuxnet worm,1 an excerpt from David Sanger&#39;s then soon to be released book entitled Confront and Conceal was published in the New York Times.2 This piece, purportedly based on the testimony of several current and former American, European and Israeli officials, declared that Stuxnet &amp;ndash; &quot;the world&#39;s first fully fledged cyber weapon&quot;3 was engineered by the United States and Israel as part of a wider covert operation aimed at undermining the Iranian nuclear program.4 Whilst the United States and Israel had long been suspected of developing...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1343/stuxnet-the-worlds-first-cyber-boomerang</guid>
			</item>
			<item>
				<title>The Internet as a Slippery Object of State Security: The Problem of Physical Border Insensitivity, Anonymity and Global Interconnectedness</title>
				<link>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</link>
				<description>By Memphis  Krickeberg - Cybersecurity is presented in the growing literature on the subject as an essentially &quot;slippery&quot; object for state security.1 The Internet puts a lot of stress on the conventional conception of state security as the insurance of the state&#39;s survival in the international realm. In addition, cybersecurity supposedly leads to a reconfiguration of state security which must be apprehended through new paradigms. In this article we establish a typology of the main arguments found in cybersecurity discourses that emphasize fundamental differences between cybersecurity and more conventional factors of state...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</guid>
			</item>
			<item>
				<title>An Overview of Essential Security Measures for Competitive Organizations</title>
				<link>http://www.inquiriesjournal.com/articles/1269/an-overview-of-essential-security-measures-for-competitive-organizations</link>
				<description>By Teodor  Topalov Et. Al. - In today&amp;rsquo;s world whether an organization has a small network managed and controlled by a small team of individuals or has multiple large databases and mainframes managed by a large team of professionals, information technology is always present in the structure of an organization. As large corporations seek to maximize the shareholder&amp;rsquo;s wealth and gain an edge in increasingly competitive niche markets, more top-level managers and executives, seek the competencies and potential benefits that a strong information security structure provides. In today&amp;rsquo;s world of innovation and advancements...</description>
				<pubDate>Fri, 30 Oct 2015 08:16 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1269/an-overview-of-essential-security-measures-for-competitive-organizations</guid>
			</item>
			<item>
				<title>An Analysis on the Regulation of Grey Market Cyber Materials</title>
				<link>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</link>
				<description>By Kelsey  Annu-Essuman - The creation of the computer network system and its spread throughout the international realm has opened doors for new ways of gathering information as well as manipulating this information for both protective and malicious purposes. While the material stored within computer systems is often thought of as being privy to the user of that system and whomever the user decides to share their data with, the rise in cyberattacks has proven otherwise. Cyber &quot;crime&quot; or &quot;attacks&quot;─the exploitation of Internet and, more generally, computer vulnerabilities in order to access and use private information ─...</description>
				<pubDate>Sat, 01 Nov 2014 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</guid>
			</item>
			<item>
				<title>Defending the Cyber Realm</title>
				<link>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</link>
				<description>By Alex  Middleton - There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of cyber-threats.1 Whether these dangers are capable of generating enough damage to warrant a redistribution of government resources is the question at the heart of this essay. This paper provides an evaluation of the cyber-threat arguing that it deserves recognition as a top-tier priority given that it poses some significant challenges to both national security and economic prosperity. Whilst cyber -crime falls under...</description>
				<pubDate>Wed, 01 Jan 2014 07:58 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</guid>
			</item>
			<item>
				<title>Cracking the Digital Vault: A Study of Cyber Espionage</title>
				<link>http://www.inquiriesjournal.com/articles/629/cracking-the-digital-vault-a-study-of-cyber-espionage</link>
				<description>By Constantine J. Petallides - The Internet originated with research funding provided by the Department of Defense Advanced Research Projects Agency (DARPA) to establish a military network. As its use expanded, a civilian segment evolved with support from the National Science Foundation (NSF) and other science agencies.[3] While wired connections between mainframes at certain bases existed as early as the late 1950s,[4] these rudimentary links had very limited functionality. The connection was usually unreliable, and in some cases could only transmit small bundles of data in one direction. While it is true that these connections...</description>
				<pubDate>Tue, 03 Apr 2012 08:05 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/629/cracking-the-digital-vault-a-study-of-cyber-espionage</guid>
			</item>
			<item>
				<title>Social Networking: Protecting Your Information and Personal Brand</title>
				<link>http://www.inquiriesjournal.com/articles/264/social-networking-protecting-your-information-and-personal-brand</link>
				<description>By Joe  E - The Internet is a necessity in Americans&amp;rsquo; lives and something that many access often throughout the day. Over 80% of students use one or more social networks and more than half log in at least once a day (Peluchette, 2008). The Internet &amp;ldquo;allows people to separate their ideas from their physical presence&amp;rdquo; (Keats Cintron, 2009) making collaboration easier between two parties.&amp;rdquo; Separation may be a city or a continent. As the number of Internet users increases, &amp;ldquo;so does the criminal usage of the Internet&amp;rdquo; according to the Swedish National Criminal Investigation...</description>
				<pubDate>Tue, 29 Jun 2010 08:05 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/264/social-networking-protecting-your-information-and-personal-brand</guid>
			</item>
			<item>
				<title>A Brief History of Cryptography</title>
				<link>http://www.inquiriesjournal.com/articles/1698/a-brief-history-of-cryptography</link>
				<description>By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The Greek&amp;rsquo;s idea was to wrap a tape around a stick, and then write the message on the wound tape. When the tape was unwound, the writing would be meaningless. The receiver of the message would of course have a stick of the same diameter and use it to decipher the message. The Roman method of cryptography was known as the Caesar Shift Cipher. It utilized the idea of shifting letters by an agreed upon number (three was a...</description>
				<pubDate>Tue, 10 Nov 2009 11:34 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1698/a-brief-history-of-cryptography</guid>
			</item>
	</channel>
</rss>
