Security

Articles

The cyber-resilience of financial institutions: significance and applicability

The growing sophistication, frequency and severity of cyberattacks targeting financial sector institutions highlight their inevitability and the impossibility of completely protecting the integrity of critical computer systems. In this context, cyber-resilience offers an attractive complementary alternative to the existing cybersecurity paradigm. Cyber-resilience is defined in this article as the capacity to withstand, recover from and […] Read more

News Posts Publications

Nouvelle publication: “Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire”

M. Bérubé, and B. Dupont (2018), Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire, Studies in Conflict & Terrorism, DOI: 10.1080/1057610X.2018.1513689. Abstract: Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction […] Read more

Articles

Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire

Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction of the global jihadist movement’s discourse of mobilization as the result of the evolution of its network of actors, the context in which its communications […] Read more

News Posts Publications

Nouvelle publication: “Internet et propagande jihadiste : la régulation polycentrique du cyberespace”

V. Crosset et B. Dupont (2018), Internet et propagande jihadiste: la régulation polycentrique du cyberespace, Critique Internationale, (78), 107-125. Abstract: In recent years, governments and civil society groups have blamed the Internet for spreading jihadist content. States, technology companies and civil society groups have established monitoring practices and solutions to address these concerns, which have assumed an international […] Read more

Articles

Internet et propagande jihadiste : la régulation polycentrique du cyberespace

In recent years, governments and civil society groups have blamed the Internet for spreading jihadist content. States, technology companies and civil society groups have established monitoring practices and solutions to address these concerns, which have assumed an international dimension. Taken as a whole, however, such efforts remain scattered and fragmented. The present article seeks to […] Read more

News Posts Publications

New publication: "La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale"

B. Dupont, (2016), La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale, Cultures et Conflits, (102), 95-120. Abstract: One of the main features of digital crime is its transnational character, which seems to pose a major challenge to the harmonization and coordination of police resources, which are by definition local. However, an empirical analysis of the […] Read more

Articles

La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale

One of the main features of digital crime is its transnational character, which seems to pose a major challenge to the harmonization and coordination of police resources, which are by definition local. However, an empirical analysis of the international governance of cybercrime provides an alternative reading. This article uses a social network analysis (SNA) approach […] Read more

News Posts

Conférence au Coeur des sciences de l’UQAM (23 février 2017) – La cybersécurité est-elle possible?

This content is not available in the selected language. Avec plus de 230 000 attaques par jour contre des états, des entreprises ou des individus, serons-nous un jour capable d’assurer notre cybersécurité? Quelles sont les contraintes techniques, légales, diplomatiques, économiques et politiques à surmonter? À quels différents types d’attaques et d’attaquants faisons-nous face? Revient-il aux militaires, […] Read more

Articles

Taking stock of networks across the security field: A review, typology and research agenda

Security network research has grown considerably in the last decade as it has been increasingly recognised that security is pursued through networks of public, private and hybrid actors or nodes. This research deals with local, institutional, international and virtual security networks and includes techniques such as social network analysis and approaches more familiar to organisational […] Read more