<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sanjay Goel</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attribution</style></keyword><keyword><style  face="normal" font="default" size="100%">confidence-building</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber arms race</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber warfare</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">87-95</style></pages><abstract><style face="normal" font="default" size="100%">Cyber warfare is a critical component of nation-states’ military arsenals, and a cyber arms race has emerged in the absence of international agreements (norms and confidence-building measures) to limit the use of cyber warfare. One key impediment to building consensus on cyber norms and confidence-building measures is a lack of transparency in cyber weapons development and poor attribution of attack perpetrators. Recently, there has been an improvement in attribution capabilities based on better data collection and the profiling of known hackers and nation states by intelligence agencies, and this should give impetus to efforts to establish confidence-building measures and cyber norms. This article discusses the need for and challenges associated with attribution, recent advances that will lead to better attribution, and the collective responsibility of nation states in addressing these challenges. It suggests several initiatives to reduce chances of cyber conflict, as well as to prevent cyber conflicts from escalating, such as defining clear processes for attribution, creating neutral bodies for incident analysis, and limiting the scope of retaliation based on the confidence in attribution.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sanjay Goel</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">National Cyber Security Strategy  and the Emergence of Strong Digital Borders</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber conflict</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">interna­tional law</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">73-86</style></pages><abstract><style face="normal" font="default" size="100%">The growth of the Internet and innovation that thrived with it was facilitated by an environment relatively free of controls. Regrettably, however, with its deep integration into the societal framework, the Internet has become a potent tool for influencing geopolitical conflicts, including interference in internal affairs of other nations, undermining national security, destabilizing financial infrastructure, and attacks on critical infrastructure. While countries are harvesting the social and economic benefits of the Internet, they are frightened of the threats it poses to national security. In response to these threats, countries are starting to tighten their internet borders and developing their cyber weaponry both as a deterrent to, and leverage during conflicts. A potential downside of such state-by-state regulation is inhibition of the rapid innovation that the Internet has traditionally fostered and the curtailing of freedom of speech that has led to the social integration in the society. On the other hand, innovation and freedom cannot thrive in a chaotic environment with rampant crime and a lack of rules, norms, and ethics. With this in mind, national policymakers face the challenge of striking a balance between regulation and potential chaos on the Internet while at the same time promoting freedom. In efforts to strike such a balance of national interests, borders in cyberspace have an important role to play along with international efforts to build trust in cyberspace and to slow down the fragmentation of the Internet. This article discusses how cyber conflicts are escalating, how mutual distrust is growing, and how nation-states are adapting to the constantly changing cyber domain.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sanjay Goel</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Anonymity vs. Security: The Right Balance for the Smart Grid</style></title><secondary-title><style face="normal" font="default" size="100%">Communications of the Association for Information Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January 2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">36</style></volume><pages><style face="normal" font="default" size="100%">23-32</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">Article 2 </style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sanjay Goel</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyberwarfare: Connecting the Dots in Cyber Intelligence</style></title><secondary-title><style face="normal" font="default" size="100%">Communications of the ACM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">August 2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">54</style></volume><pages><style face="normal" font="default" size="100%">132-140</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">8</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sanjay Goel</style></author><author><style face="normal" font="default" size="100%">Hany A. Shawky</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Estimating the Market Impact of Security Breach Announcements on Firm Values</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">404-410</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">7</style></issue></record></records></xml>