2023
DOI: 10.1016/j.chbr.2023.100282
|View full text |Cite
|
Sign up to set email alerts
|

Facing cyberthreats in a crisis and post-crisis era: Rethinking security services response strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…It can be concluded that the scale, variety and complexity of cyber threats are growing significantly. The existing security strategies, which are mandatory to combat cybercrime, will not be able to meet the future requirements that will arise in the post-war crisis era (Guitton and Fréchette, 2023). The researchers state that network dynamics with the help of artificial intelligence for specific tasks should be implanted in the process of exchanging accumulated experience between experts.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…It can be concluded that the scale, variety and complexity of cyber threats are growing significantly. The existing security strategies, which are mandatory to combat cybercrime, will not be able to meet the future requirements that will arise in the post-war crisis era (Guitton and Fréchette, 2023). The researchers state that network dynamics with the help of artificial intelligence for specific tasks should be implanted in the process of exchanging accumulated experience between experts.…”
Section: Discussionmentioning
confidence: 99%
“…The study by Guitton and Fréchette (2023), who conducted a comprehensive analysis of crisis and post-crisis cyber threats, had an impact on the author's position on the issue under research. Attention was paid to the influence of the Russian-Ukrainian conflict on the nature of cyber threats.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The proliferation of computer networks and the internet transformed the nature of intelligence collection and espionage. Cyberattacks and cyber espionage became potent tools, demanding new strategies and capabilities in CI (Putter and Dov Bachmann, 2022;Guitton and Fréchette, 2023).…”
Section: Counterintelligence Evolution and Importance In The Age Of I...mentioning
confidence: 99%
“…It is not only about identifying moles and spies but also about countering cyber threats, protecting critical infrastructure and safeguarding against the theft of intellectual property (Mobley and Wege, 2021a;Guitton and Fréchette, 2023). The historical evolution of CI reflects the enduring importance of Intelligence and Security in a world where information is a currency of power and the adversaries are as diverse and dynamic as the challenges they pose.…”
Section: Counterintelligence Evolution and Importance In The Age Of I...mentioning
confidence: 99%