RESEARCH PROPOSAL IICS 603
Name of Researcher ……………………………….
Project Title ………………………………………..
Step 1: Introduction (250-400 words)
In the section below, give a brief introduction about the key issue you are proposing to research. Try and convey to the reader convincingly why the research topic is a significant one.
Step 1.2: Research Question (50-100 words)
1.2.1 Write your research question (RQ)
1.2.2 Tell the reader what type of research question this is and what you want to know by answering this question.
Step 2: Literature Review (1,000-1,500 words)
Provide a succinct overview of the current literature on your chosen topic. Your review should, where applicable, engage with the following questions. What are some of the most important scholarly contributions to this topic or related topics? Are there any major disagreements or debates on this topic? How has theory been employed to help answer questions like yours? What methods have been previously been used to investigate this or similar issues? What research is still left to do and does your research help fill this need?
Step 3: Research Methods (1,000-1,500 words)
3.1. Hypothesis/hypotheses
Write out any preliminary hypotheses you have below that you think provide a plausible answer to your question. Remember to generalize the hypothesis or hypotheses beyond your individual case.
H1……………………………………………………………………………………………………………………………………………………………………………
H2…………………………………………………………………………………………………………………………………………………………………………….
3.2. Defining concepts
Either from your research question or from your hypothesis/hypotheses, list your key concepts and provide a definition for each. List as many as you think are relevant. In some studies, there might be one; in others there could be three or four.
Concept 1: ………………………………………………………………………………………
Concept definition: ………………………………………………………………………………………………………………………………………………………………………………
Concept 2: ………………………………………………………………………………………
Concept definition: ………………………………………………………………………………………………………………………………………………………………………………
Concept 3: ………………………………………………………………………………………
Concept definition: ………………………………………………………………………………………………………………………………………………………………………………
3.3. Research Design – Overview
Tell the reader what your overall strategy is for conducting this research. Is this a single case study or a small-N study or a large-N study? How are you going to measure your concepts? What data or evidence will your collect? What obstacles or challenges do you foresee in conducting this research? Will you be able to overcome them? If so, how?
Cyber Espionage: The Superpowers New Game!
Maitha Khalifa Al Dhaheri – 100038255
Institute of International & Civil Security, Khalifa University
IICS 603: Research Methods in the Social Sciences
Dr. Ash Rossiter
March 5, 2020
Abstract
Globalization and advanced technology brought the world closer and have increased the competition amongst them. It is no longer about the size of the fleet or land a state controls; it’s becoming more dependent on data. Data is equivalent to value; the higher the confidential state of the data, the higher the value it has. Therefore, states and non-state actors are continually working their way through cyberspace and exploiting confidential data in an act known as Cyber Espionage. This review will define the concept of cyberspace and list the threats states are exposed to within the cyberspace, focusing more on cyber espionage and its leading actors.
Cyberspace, Cyber Espionage – Concepts and Types
There is no conclusive international definition to explain the meaning of cyberspace. However, according to Russel Buchan (2019), cyberspace is the world wide web that connects people from all around the globe together, empowers communities, expands existing markets and creates new ones, and act as an information hub where data and knowledge disseminated and acquired. Looking into various countries’ cybersecurity strategies,
The rapid growth of cyberspace means increased exposure to threats and vulnerabilities that can impact international peace and security In cyberspace, threats can be categorized according to Buchan into two main types: cyber network attacks and cyber network exploitation (Buchan, 2019). Cyber networks’ attacks are those related to disrupting and destroying computer operations whilst cyber exploitation refers to exploiting the network to gather confidential and classified information (Buchan, 2019).
Lehto, on the other hand, decided to classify the threats as such: cyberattacks and techniques, malware, and physical threats (Lehto, 2019). Lehto went on to explain the threat using the European Union Agency for Cybersecurity (ENISA)-model as anything or a person that has the power to act and cause, carry, transmit, or support a threat (Lehto, 2019).
Lehto further classified the threat based on motivational factors into five categorize that is: cyberactivism/hacktivism, cybercrime, cyber espionage, cyber terrorism, and cyber warfare
Cyber Espionage Existence and Superpowers
Buchan and Lehto both agreed on the prevalence of cyber espionage in recent years is developing into a constant concern to the international society . For instance, the former contractor for the United States (U.S.) National Security Agency (NSA) Edward Snowden – who disclosed classified information to the British newspaper the Guardian – revealed that espionage is being done by big players in the market with cross boarders ties and partnerships to ensure the continual inflow and outflow of information majority via cyberspace (Buchan, 2019).
Jeffry Carr – an expert in Cyber Intelligence – believes that the People’s Republic Of China is considered one of the leading nations in cyber espionage campaigns (Carr, 2010). As the book claims, the informal code name “Titan Rain” was assigned to the ongoing Chinese cyber espionage against the United States. China has managed to download 10 to 20 terabytes of data from U.S. Army systems Engineering Command, The Naval Ocean Systems Center, the Missile Defense Agency, and Sandia National Laboratories (Carr, 2010). The initial perception was that China is targeting state actors only, but years later, when government contractors like Raytheon, Lockheed Martin, Boeing, Northrup Grumman experienced a data breach, it was apparent that both state and non-state actors were of interest to the Chinese (Carr, 2010).
The book was published in 2010, a lot has happened since then, regimes fell, and new countries rose, the republicans won the house, and Daaesh was found. Ten years later, and China is still in the leading position in cyber espionage operations, but this time, Russia, and North Korea joined the race (Lam, 2018). To this day, China’s motive is not fully comprehended. Unlike China, Russia, and North Korea, operations suggest that they are politicly motivated (Lam, 2018).
In the case of North Korea, its major attack was on Sony, a corporation located in South Korea. As a result, the staff were under threat if they did not comply with the
Limitations and Constraints
There is no unified definition of cyberspace, therefore, we were able to see its implications on different security strategies implemented by different countries. This limitation can lead to a dilemma in understanding and categorizing threats and vulnerabilities associated with cyberspace resulting in a lack or failure in mitigating or eliminating attacks.
Both Buchan and Lehto agreed on the final categorization of the threats with minor differences behind the classification that is based on destructive/non-destructive acts or based on motive accordingly (Lehto, 2019) (Buchan, 2019).
Unlike cyber espionage, cyber warfare and cyber terrorism can be easily detected. Therefore, the number of relevant cases to be reviewed are limited to the ones that caused extreme consequences.
Moving forward in the literature, Lehto analyzed cybersecurity strategies of several countries and proposed one with an emphasis on roles and responsibilities, awareness, legislation, national and international cooperation, training and research, secure ICT (Lehto, 2019). Moreover, Carr suggested PPRR strategies to combat, mitigate, and minimize the harm caused by cyber espionage all around the same points proposed by Lehto (Carr, 2010).
It is vital to understand the reasons behind the constant reoccurrence of those attacks under international law, the gaps, and the actions that are needed to minimize or mitigate it from resurfacing. According to Buchan, cyber espionage does not exist in the international law vacuum, and that states should create a legal framework that is directly relevant to cyber espionage We argue that cyber espionage happens on a daily basis, undetected, and it is very useful for international affairs. Data/information is vital in this day and age as it can be used as a coercive tool for actors to get what they are after Cyber espionage can be as destructive as traditional wars; it all depends on its usages. Therefore, we need to study relevant cases and follow the steps of its occurring and the aftermath and measure the resilience of governments being attacked and the response from the international community. Identifying the response, and measuring the resliance will give us a head start in understanding the legal framework as mitigation or facilitator to such acts.
Buchan, R. (2019). Cyber Espionage and International Law. Oxford, U.K.: Bloomsbury Publishing Plc.
Lehto, M. (2019). The Ways, Means and Ends in Cyber Security Strategies . The 12th European Conference on Information Warfare and Security (pp. 182-190). Finland: Academic Conferences and Publishing International Limited.
Carr, J. (2010). Inside Cyber Warfare: Mapping the Cyber Underworld. California: O’Reilly Media, Inc.
Lam, C. (2018). A SLAP ON THE WRIST: COMBATTING RUSSIA’S CYBER ATTACK ON THE 2016 U.S. PRESIDENTIAL ELECTION. Boston College Law Review, 59(6), 36.
Christen, M., Gordijn, B., & Loi, M. (2020). Cyber Peace: And How It Can Be Achieved. The Ethics of Cybersecurity. The International Library of Ethics.
Description of Performance Levels for Literature Review
Inadequate
(0-73 points)
Developing but below expectations
(73-79 points)
Meet expectations to accomplished
(80-92 points)
Excellent to Exemplary
(93-100 points)
Structure and prose.
(10%)
The structure of the literature review is incomprehensible, irrelevant, or confusing.
The structure of the literature review is weak.
The structure of the literature review is logical or somewhat integrated.
The structure of the literature review is logical and integrated.
Content: breadth, critical analysis, and synthesis of literature.
50%
The literature review was mostly inadequate, inappropriate, lacked depth/breadth, lacked critical evaluation, and/or lacked synthesis.
The literature review was occasionally inadequate, inappropriate, lacked depth/breadth, lacked critical evaluation, and/or lacked synthesis. The literature review was adequate, appropriate, had sufficient depth/breadth, critical evaluation, and/or had an appropriate level of synthesis.
The literature review was comprehensive, appropriate, had excellent depth/breadth, included high level critical evaluation, and/or had a high level of synthesis.
Identifying research methods.
15%
The literature review did not identify methodologies and methods of similar studies.
The literature review minimally identified methodologies and methods of similar studies. The literature review identified methodologies and methods of similar studies.
The literature review excellently identified methodologies and methods of similar studies.
Identifying research gaps, new directions
15%
The literature review did not identify any gaps which the research question is attempting to fill or new directions to take the research in.
The literature review did not identify sufficiently the gaps which the research question attempts to fill or new directions to take the research in. The literature review did identify sufficiently the gaps which the research question attempts to fill and new directions to take the research in.
The literature review excellently identified the gaps which the research question attempts to fill and new directions to take the research in.
Citations
5%
In-line citations and references do not follow the APA requirements
In-line citations and references mostly follow the APA requirements
In-line citations and references invariably follow the APA requirements In-line citations and references always follow the APA requirements
Length
5%
The paper is way too long or too short (±40% from the set length)
The paper is long or too short (±30% from the set length)
The paper is near the desired length (±20% from the set length) The paper is at the desired length (±10% from the set length)
Summary: Your literature review is showing considerable promise Maitha. But please constantly keep in your mind when writing that this is not a report whereby you are marshalling facts in support of an argument. Instead, the key purpose of the literature review is to examine, survey and analyze the most important research on your research question. In your case, you should compare the strengths and weaknesses of key works by researchers interested in the question of whether cyberspace is emerging as the main domain for geopolitical competition among the great powers. Not everyone agrees that this is the case. You can use the literature review to show why some think one way while others think something different. This is good start. Please expand your reading and the number of works you cite. Well done.
Economic Debate- Progressive Income Tax For this Economic Debate, we are going to discuss the…
TOPIC: Going Global Discussion Thread 1 (initial post due Wednesday for full credit) Please note:…
Assignment Topic This week will culminate in the creation of a narrated PowerPoint to create…
The Assignment must be submitted on Blackboard (WORD format only) via allocated folder. Assignments submitted…
you need to post your 2-page information flier to share with your Final Project Group.…
discussion: Discuss the methods used at your company to measure and ensure quality products and…