Show simple item record

dc.contributor.authorChoucri, Nazli
dc.contributor.authorAgarwal, Gaurav
dc.date.accessioned2022-04-07T15:06:53Z
dc.date.available2022-04-07T15:06:53Z
dc.date.issued2019-11-05
dc.identifier.urihttps://doi.org/10.1109/HST47167.2019.9032933
dc.identifier.urihttps://hdl.handle.net/1721.1/141740
dc.description.abstractExecutive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1] This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point.en_US
dc.description.sponsorshipThis material is based on work supported by the MIT Political Science Department & U.S. Department of Defense. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Defense.en_US
dc.language.isoen_USen_US
dc.publisher© IEEEen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.titleSecuring the Long-Chain of Cyber-Physical Global Communication Infrastructureen_US
dc.typeArticleen_US
dc.identifier.citationChoucri, N., & Agarwal, G. (2019). Securing the long-chain of cyber-physical global communication infrastructure. Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST), 1–7.en_US
dc.eprint.versionAuthor's final manuscript.en_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record