|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
100420
|
|
|
Publication |
2010.
|
Summary/Abstract |
The Strategic Defence and Security Review has recommended significant cuts across the defence establishment, affecting all armed services including the air force. However, as this decade's operations have proved, the Royal Air Force remains an essential component of modern warfare. Air Chief Marshal Simon Bryant describes how Britain's air force provides core capabilities, both in autonomous operations and as part of the joint force, across the air, space and cyber domains.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
105600
|
|
|
3 |
ID:
163594
|
|
|
Summary/Abstract |
To understand how dangerous cyber power could be, we can start by measuring it.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
139305
|
|
|
Summary/Abstract |
On 21 January 2015, Internet users in China who were trying to access blocked websites and smartphone apps encountered difficulties connecting to virtual private networks (VPNs), a popular circumvention tool for bypassing censorship in a country where government control of online space has been notorious. Astrill, StrongVPN and Golden Frog, three major providers of commercialVPN services that reported service disruptions, all blamed the interference on the Chinese cyberspace authorities. The attack, they claimed, was carried out with a level of sophistication unseen before. (1
|
|
|
|
|
|
|
|
|
|
5 |
ID:
142686
|
|
|
Summary/Abstract |
Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.
|
|
|
|
|
|
|
|
|
|
6 |
ID:
145002
|
|
|
Publication |
London, IISS, 2016.
|
Description |
155p.pbk
|
Series |
Adelphi Series; no. 456
|
Standard Number |
9781138211162
|
|
|
|
|
|
|
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
058653 | 303.48830951/INK 058653 | Main | On Shelf | General | |
058755 | 303.48830951/INK 058755 | Main | On Shelf | General | |
|
|
|
|
7 |
ID:
160685
|
|
|
Publication |
Cambridge, Cambridge University Press, 2018.
|
Description |
xx, 246p.pbk
|
Standard Number |
9781107566866
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
059495 | 005.8/MAU 059495 | Main | On Shelf | General | |
|
|
|
|
8 |
ID:
156945
|
|
|
Summary/Abstract |
This article proposes a theoretical framework to evaluate a state's potential cyber power and cyber effectiveness. It identifies the domestic and structural variables that contribute to potential cyber power, and the attributes associated with cyber effectiveness. Translating potential cyber power into cyber effectiveness is done through technical, tactical, operational, and strategic means. Effectiveness is worthwhile only in comparison to other target states. Finally, future research questions are proposed.
|
|
|
|
|
|
|
|
|
|
9 |
ID:
128795
|
|
|
10 |
ID:
128107
|
|
|
Publication |
2013.
|
Summary/Abstract |
The world is witnessing a remarkable shift in the locus of l=global power with the relative decline of the United States of America and the dramatic rise of China. It is estimated that the rise of India and China will alter the nature of the global system and the global landscape in the coming two decades. During this great geo-political transition period, there is an urgent need to revaluate our theories, paradigms, assumptions and strategies in the light of technological, economic, political and military developments in the region. The heavy dependence of government organizations, business, economic activities and military affairs of information and communication technology by (ICT) necessitates incorporation of cyber technology into our strategic calculation. Cyber power is exerting itself as a key lever in the development and execution of national policy, including counter-terrorism, economic growth, and diplomatic affairs.
|
|
|
|
|
|
|
|
|
|
11 |
ID:
182707
|
|
|
Publication |
New Delhi, MP-IDSA, 2021.
|
Description |
105p.pbk
|
Series |
MP-IDSA Monograph Series no.;73
|
Standard Number |
9789382169994
|
|
|
|
|
|
|
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
060110 | 303.4833/SAM 060110 | Main | On Shelf | General | |
060111 | 303.4833/SAM 060111 | Main | On Shelf | General | |
|
|
|
|
12 |
ID:
102410
|
|
|
Publication |
2011.
|
Summary/Abstract |
Cyber crime, cyber terrorism and cyber warfare share a common technological basis, tools, logistics and operational methods. They can also share the same social networks and have comparable goals. The differences between these categories of cyber activity are often razor thin, or only in the eye of the beholder. From the perspective of a cyber warrior, cyber crime can offer the technical basis (software tools and logistic support) and cyber terrorism the social basis (personal networks and motivation)with which to execute attacks on the computer networks of enemy groups or nations.
|
|
|
|
|
|
|
|
|
|
13 |
ID:
097950
|
|
|
14 |
ID:
128829
|
|
|
Publication |
2013-14.
|
Summary/Abstract |
Recent debate about the organizational relationship between cyber command and the NSA stress political issues over force employment. This article focuses on the latter, making the case that cyber command should be split from the NSA, because nations that marshal and molilize their cyber power and integrate it into strategy and doctrine will ensure significant national security advantage. Cyber command provides the best route for developing the tactics, technique, and procedures necessary for achieving these goals.
|
|
|
|
|
|
|
|
|
|
15 |
ID:
193169
|
|
|
Summary/Abstract |
This article explores the fashion/popularity of the idea that the exercise of cyber power is a form of warfare. Specifically, the article explains the recent decline of the cyber warfare fashion in academia and discusses its implications for strategic studies. To achieve this, we synthesize observations from previous studies with new quantitative and qualitative data. The article contributes to a growing body of literature by tracing and explaining the history of a particular theme within strategic studies.
|
|
|
|
|
|
|
|
|
|
16 |
ID:
186083
|
|
|
Summary/Abstract |
Military theories are thoughts explaining how armed forces are to be used to achieve objectives. These thoughts are often influenced by emotions, yet the influence of emotions on military theory-crafting remains underexplored. This article fills the gap by exploring how awe influences military theorising. Awe is an emotion associated with the feeling of transcendence. Several military theorists felt that way about the technologies of air power, nuclear power and cyber power, respectively. Consequently, their theories became narrowly focused, technocentric and detached from the previous theories and military history. Understanding these tendencies can help improve military theorising in the future.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|