dc.contributor.author | Choucri, Nazli | |
dc.contributor.author | Agarwal, Gaurav | |
dc.date.accessioned | 2022-04-07T15:06:53Z | |
dc.date.available | 2022-04-07T15:06:53Z | |
dc.date.issued | 2019-11-05 | |
dc.identifier.uri | https://doi.org/10.1109/HST47167.2019.9032933 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/141740 | |
dc.description.abstract | Executive Order, May 2019 states:
November 5, 2019
“...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1]
This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point. | en_US |
dc.description.sponsorship | This material is based on work supported by the MIT Political Science Department & U.S. Department of Defense. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Defense. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | © IEEE | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.title | Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Choucri, N., & Agarwal, G. (2019). Securing the long-chain of cyber-physical global communication infrastructure. Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST), 1–7. | en_US |
dc.eprint.version | Author's final manuscript. | en_US |