Proceedings of the 15th International Conference on Advances in Mobile Computing &Amp; Multimedia - MoMM2017 2017
DOI: 10.1145/3151848.3151864
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Damage Assessment of Cyber Attacks Using Mobile Observer Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…While this has allowed for mobile banking revolutions that have spread worldwide like that of the M-PESA system in Kenya and similar, also highlights an exploitable vulnerability and option in offensive capacity for Rwanda to pursue (Gewald et al 2012;Mas and Radcliffe 2010). This is an option that would require building an offensive capacity to dent mobile networks across the continent, which could backfire as no weapon remains unnoticed for long and could trigger an arms race in an offensive mobile capacity that could spread internationally (Dunham, 2008;Lakhdhar et al 2017). This could also damage Rwanda's image, internationally, reducing its ability to obtain assistance, utilize its soft power, and eventually threaten its pace of development, as with the case of North Korea, which has received scorn for not just its nuclear power development but also its capacity in offensive cyber operations (Boo, 2017;Haggard and Lindsay, 2015).…”
Section: The Greater Au and On Rwanda's Experience In Cyber-deterrencementioning
confidence: 99%
“…While this has allowed for mobile banking revolutions that have spread worldwide like that of the M-PESA system in Kenya and similar, also highlights an exploitable vulnerability and option in offensive capacity for Rwanda to pursue (Gewald et al 2012;Mas and Radcliffe 2010). This is an option that would require building an offensive capacity to dent mobile networks across the continent, which could backfire as no weapon remains unnoticed for long and could trigger an arms race in an offensive mobile capacity that could spread internationally (Dunham, 2008;Lakhdhar et al 2017). This could also damage Rwanda's image, internationally, reducing its ability to obtain assistance, utilize its soft power, and eventually threaten its pace of development, as with the case of North Korea, which has received scorn for not just its nuclear power development but also its capacity in offensive cyber operations (Boo, 2017;Haggard and Lindsay, 2015).…”
Section: The Greater Au and On Rwanda's Experience In Cyber-deterrencementioning
confidence: 99%