ICCWS Mini Tracks

The Mini Tracks for ICCWS

  • Cyber Operations in the Global Information Environment
  • Cyber Security Threats in Smart Systems and Innovative Technologies
  • Legal and Security Challenges of Drone’s Application in Military and Civilian Domains
Submit your Abstract to an Academic Conference

Cyber Operations in the Global Information Environment

Mini Track Chair: Dr Stilianos Vidalis, Cyber Operations, University of Hertfordshire, UK  

ICCWS22-MT-Cyber-Ops-and-the-GIE-Vidalis.pdf (119 downloads)  

The US DoD has defined the Information Environment (IE) as the aggregate of individuals, organizations and systems that collect, process disseminate or act on information. The Global Information Environment (GIE) defies boundaries. It is by far a non-static environment, making use of change as a catalyst in order to address business needs and mission objectives. It consists of a plethora of devices, using diverse and mobile architectures. It is hyper-charged in that every device is performing several roles. It unifies security and defence IEs with civilian IEs.  

As the IE became global, so did the Cyber Operators. Instead of operating in national environments with well-defined boundaries, assessing and protecting cyber and kinetic operations, they (Cyber Operators) are now truly operating across all types of boundaries. They are cutting across jurisdictions, having to manage and protect complex interrelationships between tangible and intangible assets. The GIE characteristics also provide challenges for the Cyber Operators to overcome to achieve information superiority. Information superiority is the advantage derived from the ability to collect, process and disseminate an uninterruptible flow of information, while exploiting or denying adversaries to do the same. Information superiority is a state achieved as the result of successful cyber operations. Cyber operations are continuous acts of force in the GIE that can include intelligence and counterintelligence, phycological operations, deception, computer network operations, situational awareness, operational security, information security, physical security and of course risk and threat assessment.  

In this track we will discuss the current practice and the future of cyber operations in the Global Information Environment. We will discuss the modern GIE, the socio-political changes that it is influencing and the complex problem of protecting it.Topics of interest include, but are not limited to:  

  • Cyber Operations in the Global Information Environment:
  • intelligence and counterintelligence,
  • phycological operations and deception,
  • computer network operations and situational awareness,
  • operational security, information security and physical security
  • risk and threat assessment.

Cyber Security Threats in Smart Systems and Innovative Technologies

Dr. Jawad Hussain Awan
Dr Elena Sitnikova

Mini Track Chair:  Dr. Jawad Hussain Awan, University of Sindh, Jamshoro, Pakistan & Dr Elena Sitnikova UNSW Canberra, Australia 

ICCWS22-MT-Smart-Systems-innovative-Technologies-Awan-Sitnikova.pdf (96 downloads)  

According to Global Risks Report 2021 (WEF, 2021), likely risks to be faced over the next ten years inlcude digital power concentration, digital inequality, cyber security failure, the growing ratio of cyber risks and breakdown of Smart infrastructures. The purpose of this mini-track is to bring together experts including academics and industrialists working or interested in the field of cyber security, cyber situational awareness and risk assessment research with interests in modern technologies such as Internet of Vehicles, Internet of Things, Malware/Intruder detection and prevention technologies, Smart environments and cyber physical systems.

Topics of interest include, but are not limited to:

  • Cyber-attack predication
  • Cyber risk assessment and impact analysis
  • Cyber security strategies and security for cyber physical systems
  • Digital forensics approaches to cope with cybercrimes
  • Cyber situational awareness to cope with cyber-attack
  • Case studies of cyber-security incidents including cyber-attacks
  • Security threats in Internet of Vehicles and Internet of Things

Legal and Security Challenges of Drone’s Application in Military and Civilian Domains

 Mini Track Chair: Dr. Pardis Moslemzadeh Tehrani, Faculty of Law, University of Malaya, Malaysia  

ICCWS22-MT-Drones-Tehrani.pdf (88 downloads)  

The usage of drones/Unmanned Aerial Vehicles (UASs) has increased exponentially with the continuous rise of multi-purpose applications in military and civilian domains by amateurs, journalists, businesses, and governmental actors. Such activities led to the production of a large amount of private or sensitive imagery and an uncountable accumulation of data. UASs enable authorities to gather associated data along with imagery such as GPS coordinates of imagery or network traffic. It is necessary for states to develop a regulatory structure for the usage of UASs as by 2025 the jobs created from the data gathered by UAS operations which have an economic impact of $82 billion. The emerging threats of using drones along with counter-measures strategy needs to be investigated. The risk of hacking and hijacking drones could cause data breaches while posing a major risk to public safety. Malicious actors can hack drones and perform nefarious actions. Therefore, the need for detective, protective and preventive counter-measures is highly required.  

Cyber-security risks may arise when using radiofrequency spectra to communicate between the drone’s ground control and the drone platform, and between instruments on the drone such as cameras and data receivers. Drones are therefore vulnerable to hacking, interceptions and signal manipulation during flight. It also may infringe the right to privacy and private life if the drone is flown intrusively.  

Various warning issued by states indicates that entities around the globe are taking to address the dangers posed by to airspace safety. Many countries including the USA developed national airspace drone traffic to manage the drone’s flight. The government working hard to ensure providing better protection for people against emerging drone threats. Drones produce challenges for law enforcement as they can identify and interdict illicit activity. Giving the rapid technology advancement and proliferation, the government must address the fact that drones can be used maliciously to damage infrastructure, disrupt activities and hurt people.Topics of interest include, but are not limited to:  

  • Offensive and defensive usage of Drone/ UASs
  • Legal and technical challenges of using Drone/ UASs
  • Data breach of Drone/ UAS
  • Cyber security in Drone/ UAS
  • Collection, use, retention, and dissemination of data in Drone/ UAS
  • Liability for cybersecurity negligence or data breaches in Drone/ UAS operations
  • Cyber-attack directed at use of Drone/ UASs
  • Regulatory aspects of Drone/ UAS