Secure Tactical Communications for Inter-Organizational Collaboration: The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield

The development within the area of information and communications technology (ICT) has been rapid during the last couple of decades. Advancements in mobile technology, such as smartphones and other ...

[1]  Victor Pomponiu,et al.  Securing Wireless Ad Hoc Networks: State of the Art and Challenges , 2014 .

[2]  A. Onwuegbuzie Introduction: Putting the MIXED back into quantitative and qualitative research in educational research and beyond: Moving toward the radical middle , 2012 .

[3]  Gert Roelofsen TETRA Security , 2000, Inf. Secur. Tech. Rep..

[4]  Helen Nissenbaum,et al.  Where Computer Security Meets National Security1 , 2005, Ethics and Information Technology.

[5]  Jan A.G.M. van Dijk,et al.  The network society , 1997 .

[6]  O. E. Dial,et al.  The social impact of computers , 1970, AFIPS '70 (Spring).

[7]  Johannes A.G.M. The network society - second edition , 2006 .

[8]  Jeannie A. Stamberger,et al.  The Evolution of Hastily Formed Networks for Disaster Response: Technologies, Case Studies, and Future Trends , 2011, 2011 IEEE Global Humanitarian Technology Conference.

[9]  P. W. Singer,et al.  Wired for War: The Robotics Revolution and Conflict in the 21st Century , 2009 .

[10]  A. Bryman,et al.  The SAGE handbook of organizational research methods , 2009 .

[11]  Don Smith Life's certainties: death, taxes and APTs , 2013, Netw. Secur..

[12]  Gurpreet Dhillon,et al.  Principles of information systems security - text and cases , 2006 .

[13]  Carrick T. Longley Field Information Support Tool , 2010 .

[14]  John H. Hitchcock,et al.  An Inclusive Framework for Conceptualizing Mixed Methods Design Typologies: Moving Toward Fully Integrated Synergistic Research Models , 2010 .

[15]  Elizabeth D. Mynatt,et al.  Supporting communication and collaboration practices in safety-critical situations , 2000, CHI Extended Abstracts.

[16]  T. J. Grant,et al.  Vulnerability of C2 Networks to Attack: Measuring the Topology of Eleven Dutch Army C2 Systems , 2011 .

[17]  Gautam Mukunda,et al.  Caught in the Net: Lessons from the Financial Crisis for a Networked Future , 2009, The US Army War College Quarterly: Parameters.

[18]  Keith L. Shimko The Iraq Wars and America's Military Revolution: The Third Iraq War, 2003–? – A Revolution Denied? , 2010 .

[19]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[20]  Tom DeMarco,et al.  The Deadline: A Novel About Project Management , 1997 .

[21]  Maria Stella Iacobucci,et al.  Reconfigurable Radio Systems: Network Architectures and Standards , 2013 .

[22]  Björn Persson,et al.  Military utility : A proposed concept to support decision-making , 2015 .

[23]  J M Morse,et al.  Approaches to qualitative-quantitative methodological triangulation. , 1991, Nursing research.

[24]  Richard J. Enbody,et al.  Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.

[25]  Ralph Morelli,et al.  POSIT: Portable Search and Identification Tool Using the Google Phone for Disaster Management , 2009 .

[26]  Christian Wenz,et al.  DRM Under Attack: Weaknesses in Existing Systems , 2003, Digital Rights Management.

[27]  Miguel P Caldas,et al.  Research design: qualitative, quantitative, and mixed methods approaches , 2003 .

[28]  Gurpreet Dhillon,et al.  Interpreting Deep Structures of Information Systems Security , 2012, Comput. J..

[29]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[30]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[31]  J. Palutikof,et al.  Climate change 2007 : impacts, adaptation and vulnerability , 2001 .

[32]  Mohammad Reza Meybodi,et al.  Technological Advancements and Applications in Mobile Ad-Hoc Networks : Research Trends , 2012 .

[33]  J. Alexander,et al.  Images of Organization , 1988 .

[34]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[35]  Thomas G. Holzman Computer-human interface solutions for emergency medical care , 1999, INTR.

[36]  Marko Jahnke,et al.  MITE – MANET Intrusion Detection for Tactical Environments , 2008 .

[37]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[38]  Eugene Grayver Implementing Software Defined Radio , 2013 .

[39]  Christopher J. Novak,et al.  2009 Data Breach Investigations Report , 2009 .

[40]  M. Denscombe The Good Research Guide: for small-scale social research projects , 1998 .

[41]  Peter J. Denning Hastily formed networks , 2006, CACM.

[42]  J. Shaoul Human Error , 1973, Nature.

[43]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[44]  M. Castells The rise of the network society , 1996 .

[45]  D. Jorgensen Participant Observation: A Methodology for Human Studies , 1989 .

[46]  Etienne Wenger,et al.  Communities of Practice: Learning, Meaning, and Identity , 1998 .

[47]  Simin Nadjm-Tehrani,et al.  Wireless ad hoc dissemination for search and rescue , 2010, ISCRAM.

[48]  Christos Xenakis,et al.  A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..

[49]  Simon French,et al.  Believe in the Model: Mishandle the Emergency , 2005 .

[50]  Azriel Lorber Misguided Weapons: Technological Failure and Surprise on the Battlefield , 2002 .

[51]  Peter G. W. Keen,et al.  Organizing for crisis response , 1996, J. Inf. Technol..

[52]  A. Gillis,et al.  Research for Nurses: Methods and Interpretation , 2001 .

[53]  Susan W. Brenner,et al.  Cyberterrorism , 2002 .

[54]  Peter Stavroulakis TErrestrial Trunked RAdio - TETRA: A Global Security Tool , 2007 .

[55]  Robert Koch Towards next-generation Intrusion Detection , 2011, 2011 3rd International Conference on Cyber Conflict.

[56]  Myriam Dunn Cavelty The militarisation of cyberspace: Why less may be better , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).

[57]  Dong-You Choi,et al.  A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[58]  Greg Guest,et al.  Describing Mixed Methods Research , 2013 .

[59]  Max Boot,et al.  War Made New: Technology, Warfare, and the Course of History, 1500 to Today , 2006 .

[60]  H. Tavani Informational Privacy: Concepts, Theories, and Controversies , 2009 .

[61]  Justin G. Holbrook Communications Privacy in the Military , 2009 .

[62]  Arthur K. Cebrowski,et al.  Network Centric Warfare: Its Origins and Future , 1998 .

[63]  Ronald J. Deibert,et al.  Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.

[64]  J. Rubenfeld The Right of Privacy , 1989 .

[65]  Eric Cole,et al.  Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization , 2012 .

[66]  Edward N. Rappaport,et al.  THE DEADLIEST, COSTLIEST, AND MOST INTENSE UNITED STATES TROPICAL CYCLONES FROM 1851 TO 2004 (AND OTHER FREQUENTLY REQUESTED HURRICANE FACTS) , 2005 .

[67]  Ashok Jhunjhunwala,et al.  User scenarios 2020: a worldwide wireless future , 2009 .

[68]  Johan Sigholm Collection and Distribution of Disaster Field Data , 2010 .