Security
Enhancing relationships between criminology and cybersecurity
‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, […] Read more
The cyber-resilience of financial institutions: significance and applicability
The growing sophistication, frequency and severity of cyberattacks targeting financial sector institutions highlight their inevitability and the impossibility of completely protecting the integrity of critical computer systems. In this context, cyber-resilience offers an attractive complementary alternative to the existing cybersecurity paradigm. Cyber-resilience is defined in this article as the capacity to withstand, recover from and […] Read more
Nouvelle publication: “Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire”
M. Bérubé, and B. Dupont (2018), Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire, Studies in Conflict & Terrorism, DOI: 10.1080/1057610X.2018.1513689. Abstract: Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction […] Read more
Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire
Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction of the global jihadist movement’s discourse of mobilization as the result of the evolution of its network of actors, the context in which its communications […] Read more
Nouvelle publication: “Internet et propagande jihadiste : la régulation polycentrique du cyberespace”
V. Crosset et B. Dupont (2018), Internet et propagande jihadiste: la régulation polycentrique du cyberespace, Critique Internationale, (78), 107-125. Abstract: In recent years, governments and civil society groups have blamed the Internet for spreading jihadist content. States, technology companies and civil society groups have established monitoring practices and solutions to address these concerns, which have assumed an international […] Read more
Internet et propagande jihadiste : la régulation polycentrique du cyberespace
In recent years, governments and civil society groups have blamed the Internet for spreading jihadist content. States, technology companies and civil society groups have established monitoring practices and solutions to address these concerns, which have assumed an international dimension. Taken as a whole, however, such efforts remain scattered and fragmented. The present article seeks to […] Read more
Toronto Star Op.-Ed.: How artificial intelligence will be used for social control
This content is not available in the selected language. Mass surveillance and manipulation by powerful AI algorithms represent a much more imminent and tangible threat to our democratic values than killer robots. https://www.thestar.com/opinion/contributors/2017/12/15/how-artificial-intelligence-will-be-used-for-social-control.html Read more
New publication: "La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale"
B. Dupont, (2016), La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale, Cultures et Conflits, (102), 95-120. Abstract: One of the main features of digital crime is its transnational character, which seems to pose a major challenge to the harmonization and coordination of police resources, which are by definition local. However, an empirical analysis of the […] Read more
La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale
One of the main features of digital crime is its transnational character, which seems to pose a major challenge to the harmonization and coordination of police resources, which are by definition local. However, an empirical analysis of the international governance of cybercrime provides an alternative reading. This article uses a social network analysis (SNA) approach […] Read more
Conférence au Coeur des sciences de l’UQAM (23 février 2017) – La cybersécurité est-elle possible?
This content is not available in the selected language. Avec plus de 230 000 attaques par jour contre des états, des entreprises ou des individus, serons-nous un jour capable d’assurer notre cybersécurité? Quelles sont les contraintes techniques, légales, diplomatiques, économiques et politiques à surmonter? À quels différents types d’attaques et d’attaquants faisons-nous face? Revient-il aux militaires, […] Read more