Ahmad Mohee - Academia.edu (original) (raw)

Uploads

Papers by Ahmad Mohee

Research paper thumbnail of Can Cyber Attacks Put An End To The Russo-Ukrainian Conflict?

Research paper thumbnail of Contradictions of Cairo & The New Administrative Capital

OSF Preprints, Apr 2, 2023

This article aims to shed light on the features, roots, manifestations, and causes of the contrad... more This article aims to shed light on the features, roots, manifestations, and causes of the contradictions of Cairo, with a focus on its phenomenon of "slum cities" and the "lack of comprehensive urban planning vision". It also shed light on Egypt’s new administrative capital as an attempt to create a new alternative planned capital, applying the concept of comprehensive urban planning vision. Also discusses the steps taken by the government in the hope to eliminate the chronic defects and contradictions which the Egyptian society and specially the residents of Cairo have suffered from for several decades.

Research paper thumbnail of The Impact of the Israeli-Iranian Cyberwar on Arab Regional Security

In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab r... more In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab regional security using the regional security complex theory of Buzan, Wæver, and de Wilde. To this end, we analyzed international relations in the Arab world, including changes in patterns of amity-enmity, mutual security dependence, and distribution of powers. This study proved that Israeli-Iranian cyberwar had a clear impact on Arab regional security. The repercussions, dangers and threats of this cyberwar have led to fundamental changes to patterns of international relations in the Arab region, including: • Increasing mutual Cybersecurity dependence • Changing the patterns of amity-enmity • Changing the balance of cyber power among the countries of the region. This finally resulted in the formation of an Arab regional Cybersecurity complex, at the initiative of the Kingdom of Saudi Arabia with participation from the Gulf Cooperation Council countries.

Research paper thumbnail of International Relations of the Republic of Djibouti

Research paper thumbnail of Cyber war: The hidden side of the Russian-Ukrainian crisis

Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it ... more Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it does occur, could have its cyber repercussions. Cyber specialists are aware that behind all this is a cyber-war, whose battles have already begun and whose victims have multiplied since 2014. This article aims to shed light on the history of the Russian-Ukrainian cyber war and the most important operations that took place during it. It also sheds light on the cyber capabilities of both sides, and prospects the future of cyber war for both sides and the role of the United States of America and the European Union in it. While Ukraine suffers lack of cyber security expertise, poor regulation, limited response capacity and lack of coordination between cyber related agencies, Kiev is aware of the strength of the Russian cyber capabilities and is currently in a race against time to reduce the gap and improve means of defense and cyber deterrence in cooperation with allies, especially the United States and the European Union.

Research paper thumbnail of International Relations of the Republic of Djibouti

Research paper thumbnail of A Realistic Analysis of the Stuxnet Cyber-attack

This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexi... more This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a strategic choice for managing the conflict instead of traditional choices? It also gave an understanding for the security challenges and the strategic implications that cyber-attack had to pose. Finally, it reached a number of conclusions to the effect that: Realism, as a theory mostly concerned with issues of national security and power, can be a very suitable theoretical framework for analyzing and understanding cyber-attacks. The analysis confirmed that realism is an appropriate framework for identifying important issues related to security in the cyberspace and can provide useful insights into some of the enduring characteristics of international relations in the cyberspace.

Research paper thumbnail of A Realistic Analysis of the Stuxnet Cyber-attack

This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexi... more This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a strategic choice for managing the conflict instead of traditional choices? It also gave an understanding for the security challenges and the strategic implications that cyber-attack had to pose. Finally, it reached a number of conclusions to the effect that: Realism, as a theory mostly concerned with issues of national security and power, can be a very suitable theoretical framework for analyzing and understanding cyber-attacks. The analysis confirmed that realism is an appropriate framework for identifying important issues related to security in the cyberspace and can provide useful insights into some of the enduring characteristics of international relations in the cyberspace.

Research paper thumbnail of Cyber war: The hidden side of the Russian-Ukrainian crisis

SocArXiv, 2022

Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it ... more Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it does occur, could have its cyber repercussions. Cyber specialists are aware that behind all this is a cyber-war, whose battles have already begun and whose victims have multiplied since 2014. This article aims to shed light on the history of the Russian-Ukrainian cyber war and the most important operations that took place during it. It also sheds light on the cyber capabilities of both sides, and prospects the future of cyber war for both sides and the role of the United States of America and the European Union in it. While Ukraine suffers lack of cyber security expertise, poor regulation, limited response capacity and lack of coordination between cyber related agencies, Kiev is aware of the strength of the Russian cyber capabilities and is currently in a race against time to reduce the gap and improve means of defense and cyber deterrence in cooperation with allies, especially the United States and the European Union.

Thesis Chapters by Ahmad Mohee

Research paper thumbnail of The Impact of the Israeli-Iranian Cyberwar on Arab Regional Security

APSA Preprints, 2023

In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab r... more In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab regional security using the regional security complex theory of Buzan, Wæver, and de Wilde. To this end, we analyzed international relations in the Arab world, including changes in patterns of amity-enmity, mutual security dependence, and distribution of powers. This study proved that Israeli-Iranian cyberwar had a clear impact on Arab regional security. The repercussions, dangers and threats of this cyberwar have led to fundamental changes to patterns of international relations in the Arab region, including:
• Increasing mutual Cybersecurity dependence
• Changing the patterns of amity-enmity
• Changing the balance of cyber power among the countries of the region.
This finally resulted in the formation of an Arab regional Cybersecurity complex, at the initiative of the Kingdom of Saudi Arabia with participation from the Gulf Cooperation Council countries.

Research paper thumbnail of Can Cyber Attacks Put An End To The Russo-Ukrainian Conflict?

Research paper thumbnail of Contradictions of Cairo & The New Administrative Capital

OSF Preprints, Apr 2, 2023

This article aims to shed light on the features, roots, manifestations, and causes of the contrad... more This article aims to shed light on the features, roots, manifestations, and causes of the contradictions of Cairo, with a focus on its phenomenon of "slum cities" and the "lack of comprehensive urban planning vision". It also shed light on Egypt’s new administrative capital as an attempt to create a new alternative planned capital, applying the concept of comprehensive urban planning vision. Also discusses the steps taken by the government in the hope to eliminate the chronic defects and contradictions which the Egyptian society and specially the residents of Cairo have suffered from for several decades.

Research paper thumbnail of The Impact of the Israeli-Iranian Cyberwar on Arab Regional Security

In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab r... more In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab regional security using the regional security complex theory of Buzan, Wæver, and de Wilde. To this end, we analyzed international relations in the Arab world, including changes in patterns of amity-enmity, mutual security dependence, and distribution of powers. This study proved that Israeli-Iranian cyberwar had a clear impact on Arab regional security. The repercussions, dangers and threats of this cyberwar have led to fundamental changes to patterns of international relations in the Arab region, including: • Increasing mutual Cybersecurity dependence • Changing the patterns of amity-enmity • Changing the balance of cyber power among the countries of the region. This finally resulted in the formation of an Arab regional Cybersecurity complex, at the initiative of the Kingdom of Saudi Arabia with participation from the Gulf Cooperation Council countries.

Research paper thumbnail of International Relations of the Republic of Djibouti

Research paper thumbnail of Cyber war: The hidden side of the Russian-Ukrainian crisis

Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it ... more Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it does occur, could have its cyber repercussions. Cyber specialists are aware that behind all this is a cyber-war, whose battles have already begun and whose victims have multiplied since 2014. This article aims to shed light on the history of the Russian-Ukrainian cyber war and the most important operations that took place during it. It also sheds light on the cyber capabilities of both sides, and prospects the future of cyber war for both sides and the role of the United States of America and the European Union in it. While Ukraine suffers lack of cyber security expertise, poor regulation, limited response capacity and lack of coordination between cyber related agencies, Kiev is aware of the strength of the Russian cyber capabilities and is currently in a race against time to reduce the gap and improve means of defense and cyber deterrence in cooperation with allies, especially the United States and the European Union.

Research paper thumbnail of International Relations of the Republic of Djibouti

Research paper thumbnail of A Realistic Analysis of the Stuxnet Cyber-attack

This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexi... more This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a strategic choice for managing the conflict instead of traditional choices? It also gave an understanding for the security challenges and the strategic implications that cyber-attack had to pose. Finally, it reached a number of conclusions to the effect that: Realism, as a theory mostly concerned with issues of national security and power, can be a very suitable theoretical framework for analyzing and understanding cyber-attacks. The analysis confirmed that realism is an appropriate framework for identifying important issues related to security in the cyberspace and can provide useful insights into some of the enduring characteristics of international relations in the cyberspace.

Research paper thumbnail of A Realistic Analysis of the Stuxnet Cyber-attack

This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexi... more This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a strategic choice for managing the conflict instead of traditional choices? It also gave an understanding for the security challenges and the strategic implications that cyber-attack had to pose. Finally, it reached a number of conclusions to the effect that: Realism, as a theory mostly concerned with issues of national security and power, can be a very suitable theoretical framework for analyzing and understanding cyber-attacks. The analysis confirmed that realism is an appropriate framework for identifying important issues related to security in the cyberspace and can provide useful insights into some of the enduring characteristics of international relations in the cyberspace.

Research paper thumbnail of Cyber war: The hidden side of the Russian-Ukrainian crisis

SocArXiv, 2022

Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it ... more Conventional political analysts point out that a Russian-Ukrainian military confrontation, if it does occur, could have its cyber repercussions. Cyber specialists are aware that behind all this is a cyber-war, whose battles have already begun and whose victims have multiplied since 2014. This article aims to shed light on the history of the Russian-Ukrainian cyber war and the most important operations that took place during it. It also sheds light on the cyber capabilities of both sides, and prospects the future of cyber war for both sides and the role of the United States of America and the European Union in it. While Ukraine suffers lack of cyber security expertise, poor regulation, limited response capacity and lack of coordination between cyber related agencies, Kiev is aware of the strength of the Russian cyber capabilities and is currently in a race against time to reduce the gap and improve means of defense and cyber deterrence in cooperation with allies, especially the United States and the European Union.

Research paper thumbnail of The Impact of the Israeli-Iranian Cyberwar on Arab Regional Security

APSA Preprints, 2023

In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab r... more In this study, we aim to measure the overall impact of the Israeli-Iranian cyberwar on the Arab regional security using the regional security complex theory of Buzan, Wæver, and de Wilde. To this end, we analyzed international relations in the Arab world, including changes in patterns of amity-enmity, mutual security dependence, and distribution of powers. This study proved that Israeli-Iranian cyberwar had a clear impact on Arab regional security. The repercussions, dangers and threats of this cyberwar have led to fundamental changes to patterns of international relations in the Arab region, including:
• Increasing mutual Cybersecurity dependence
• Changing the patterns of amity-enmity
• Changing the balance of cyber power among the countries of the region.
This finally resulted in the formation of an Arab regional Cybersecurity complex, at the initiative of the Kingdom of Saudi Arabia with participation from the Gulf Cooperation Council countries.