Query Result Set
Skip Navigation Links
   ActiveUsers:1528Hits:18363765Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBERWARFARE (20) answer(s).
 
SrlItem
1
ID:   189139


Crisis of trust: the search for new approaches to nuclear arms control / P. Sevostyanov, V. Mizin   Journal Article
P. Sevostyanov, V. Mizin Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract THE OUTBREAK in 2020 of the coronavirus pandemic coincided with a sharp deterioration in relations between Russia and the leading NATO countries, headed by the US. For the first time in the 30 years since the end of the Cold War, officials and experts have started expressing fears about the possibility of an armed conflict between the parties.
        Export Export
2
ID:   132231


Cyberterrorism threat: findings from a survey of researchers / Jarvis, Lee; Macdonald, Stuart; Nouri, Lella   Journal Article
Jarvis, Lee Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by an imminent threat of cyberterrorism, and other, more skeptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (1) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (2) Has a cyberterrorism attack ever taken place?; and (3) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counterterrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.
        Export Export
3
ID:   108288


Cyberwarfare: nature and content / Antonovich, P I   Journal Article
Antonovich, P I Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
4
ID:   114711


Cyberweapons: leveling the international playing field / Rustici, Ross M   Journal Article
Rustici, Ross M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Key Words NATO  United States  Cyberwarfare  Hackers  Cyberweapons  Cyberthreats 
Soviet Union 
        Export Export
5
ID:   165133


Damoclean sword of offensive cyber: policy uncertainty and collective insecurity / Leuprecht, Christian; Szeman, Joseph   Journal Article
Leuprecht, Christian Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.
        Export Export
6
ID:   171594


Data laws or data wars / Rosa, Brunello   Journal Article
Rosa, Brunello Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
7
ID:   127364


Dealing with cyber-warfare in future conflicts / Lea, Sebastian   Journal Article
Lea, Sebastian Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
8
ID:   175284


Deterrence with Imperfect Attribution / Wolitzky, Alexander ; Mesquita, Ethan Bueno De ; Baliga, Sandeep   Journal Article
Mesquita, Ethan Bueno de Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Motivated by recent developments in cyberwarfare, we study deterrence in a world where attacks cannot be perfectly attributed to attackers. In the model, each of attackers may attack the defender. The defender observes a noisy signal that probabilistically attributes the attack. The defender may retaliate against one or more attackers and wants to retaliate against the guilty attacker only. We note an endogenous strategic complementarity among the attackers: if one attacker becomes more aggressive, that attacker becomes more “suspect” and the other attackers become less suspect, which leads the other attackers to become more aggressive as well. Despite this complementarity, there is a unique equilibrium. We identify types of improvements in attribution that strengthen deterrence—namely, improving attack detection independently of any effect on the identifiability of the attacker, reducing false alarms, or replacing misidentification with non-detection. However, we show that other improvements in attribution can backfire, weakening deterrence—these include detecting more attacks where the attacker is difficult to identify or pursuing too much certainty in attribution. Deterrence is improved if the defender can commit to a retaliatory strategy in advance, but the defender should not always commit to retaliate more after every signal.
        Export Export
9
ID:   132428


Forking paths: war after Afghanistan / Evans, Michael   Journal Article
Evans, Michael Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
10
ID:   154579


Game of thrones: China uses cyber espionage as a surefire way to defeat the US and maintain its sovereignty / Ghoshal, Debalina   Journal Article
Ghoshal, Debalina Journal Article
0 Rating(s) & 0 Review(s)
Key Words Information Warfare  Sovereignty  United States  China  Missile Defence System  Hacking 
Cyberwarfare  THAAD 
        Export Export
11
ID:   150171


Hunting for signal in the noise / Torruella, Anika   Journal Article
Torruella, Anika Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
12
ID:   162680


Limiting cyberwarfare: applying arms-control models to an emerging technology / Dumbacher, Erin D   Journal Article
Dumbacher, Erin D Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.
        Export Export
13
ID:   154331


Millenials’ war: dilemmas of network dependency in today’s military / Crosston, Matthew   Journal Article
Crosston, Matthew Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.
        Export Export
14
ID:   173809


On the asymmetric advantages of cyberwarfare. Western literature and the Chinese journal Guofang Keji / Dossi, Simone   Journal Article
Dossi, Simone Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract An issue that has been widely debated in the West is whether cyberwarfare gives militarily weaker actors asymmetric advantages. Is cyberwarfare a weapon of the weak? Or does it rather multiply the advantages enjoyed by militarily superior actors? These questions have major implications for China, which – as a rising power – must face stronger and weaker opponents at the same time. Based on an analysis of the Chinese journal Guofang Keji, this article investigates how China’s strategic community theorises advantage and disadvantage in the cyber domain and how this differs from Western perspectives on cyberwarfare.
        Export Export
15
ID:   120291


Proliferation of cyberwarfare capabilities and interstate war, : Liff responds to Junio / Liff, Adam P   Journal Article
Liff, Adam P Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
16
ID:   146361


Securing cyberspace: international and Asian perspectives / Samuel, Cherian (ed.); Sharma, Munish (ed.) 2016  Book
Samuel, Cherian (ed.) Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Pentagon Press, 2016.
Description xiv, 346p.hbk
Standard Number 9788182749184
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058748005.8/SAM 058748MainOn ShelfGeneral 
058749005.8/SAM 058749MainOn ShelfGeneral 
17
ID:   091455


Securing the information highway / Clark, Wesley K; Levin, Peter L   Journal Article
Clark, Wesley K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Cyberwarfare is not an abstract future threat. The United States' electronic defenses are vulnerable and Washington must act quickly to secure computer networks, software, and hardware before it is too late.
        Export Export
18
ID:   056269


Teaching strategy and security in cyberspace: An interdisciplin / Nielsen , Suzanne C May 2003  Journal Article
Nielsen , Suzanne C Journal Article
0 Rating(s) & 0 Review(s)
Key Words Security  Information Technology  Cyberwarfare 
        Export Export
19
ID:   123550


UN takes a big step forward on cybersecurity / Wolter, Detlev   Journal Article
Wolter, Detlev Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
20
ID:   092183


Weighing the case for a convention to limit cyberwarfare / Elliott, David   Journal Article
Elliott, David Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Cyberattack is emerging as a new type of nonlethal weapon that can cause substantial harm to society, especially when used in its most advanced version by countries at war. It may be time to consider an international convention to limit the initiation of such use, particularly against targets that are part of critical national infrastructure and are basically civilian.
Key Words Cyberwarfare  Civilian  Nonlethal Weapon  Cyberattack  Cybersecurity 
        Export Export