Query Result Set
Skip Navigation Links
   ActiveUsers:1880Hits:18231188Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER POWER (16) answer(s).
 
SrlItem
1
ID:   100420


Air, space and cyber power: strategic choice and operational imperative / Bryant, Simon   Journal Article
Bryant, Simon Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract The Strategic Defence and Security Review has recommended significant cuts across the defence establishment, affecting all armed services including the air force. However, as this decade's operations have proved, the Royal Air Force remains an essential component of modern warfare. Air Chief Marshal Simon Bryant describes how Britain's air force provides core capabilities, both in autonomous operations and as part of the joint force, across the air, space and cyber domains.
Key Words Money  Space  Air  Cyber Power 
        Export Export
2
ID:   105600


Airpower, spacepower, and cyberpower / Lambeth, Benjamin S   Journal Article
Lambeth, Benjamin S Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words Sea Power  United States  Airpower  Cyber Power  Cyberpower  Spacepower 
Air Power 
        Export Export
3
ID:   163594


Assessing cyber power / Willett, Marcus   Journal Article
Willett, Marcus Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract To understand how dangerous cyber power could be, we can start by measuring it.
Key Words Cyber Power 
        Export Export
4
ID:   139305


Becoming a cyber power: China’s cybersecurity upgrade and its consequences / Yuen, Samson   Article
Yuen, Samson Article
0 Rating(s) & 0 Review(s)
Summary/Abstract On 21 January 2015, Internet users in China who were trying to access blocked websites and smartphone apps encountered difficulties connecting to virtual private networks (VPNs), a popular circumvention tool for bypassing censorship in a country where government control of online space has been notorious. Astrill, StrongVPN and Golden Frog, three major providers of commercialVPN services that reported service disruptions, all blamed the interference on the Chinese cyberspace authorities. The attack, they claimed, was carried out with a level of sophistication unseen before. (1
        Export Export
5
ID:   142686


China’s emergence as a cyber power / Sharma, Munish   Article
Sharma, Munish Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.
Key Words China  Cyber Threats  Cyber Power  Informationalisation  Cyber Domain 
        Export Export
6
ID:   145002


China's cyber power / Inkster, Nigel 2016  Book
Inkster, Nigel Book
0 Rating(s) & 0 Review(s)
Publication London, IISS, 2016.
Description 155p.pbk
Series Adelphi Series; no. 456
Standard Number 9781138211162
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058653303.48830951/INK 058653MainOn ShelfGeneral 
058755303.48830951/INK 058755MainOn ShelfGeneral 
7
ID:   160685


Cyber mercenaries: the state, hackers, and power / Maurer, Tim 2018  Book
Maurer, Tim Book
0 Rating(s) & 0 Review(s)
Publication Cambridge, Cambridge University Press, 2018.
Description xx, 246p.pbk
Standard Number 9781107566866
Key Words Human Rights  Geopolitics  Cyber Security  Cyber Power  Cyber Proxies 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059495005.8/MAU 059495MainOn ShelfGeneral 
8
ID:   156945


Cyber power and cyber effectiveness: an analytic framework / Bebber, Robert “Jake”   Journal Article
Bebber, Robert “Jake” Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article proposes a theoretical framework to evaluate a state's potential cyber power and cyber effectiveness. It identifies the domestic and structural variables that contribute to potential cyber power, and the attributes associated with cyber effectiveness. Translating potential cyber power into cyber effectiveness is done through technical, tactical, operational, and strategic means. Effectiveness is worthwhile only in comparison to other target states. Finally, future research questions are proposed.
Key Words Cyber Power  Cyber Effectiveness 
        Export Export
9
ID:   128795


From sea power to cyber power: learning form the past to craft a strategy for the future / Barcomb, Kris E   Journal Article
Barcomb, Kris E Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Key Words Sea Power  United States  Europe  Cyberspace  Naval Power  Cyber Power 
Expansionism 
        Export Export
10
ID:   128107


India's cyber warfare strategy in next decade / Sharma, M K   Journal Article
Sharma, M K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The world is witnessing a remarkable shift in the locus of l=global power with the relative decline of the United States of America and the dramatic rise of China. It is estimated that the rise of India and China will alter the nature of the global system and the global landscape in the coming two decades. During this great geo-political transition period, there is an urgent need to revaluate our theories, paradigms, assumptions and strategies in the light of technological, economic, political and military developments in the region. The heavy dependence of government organizations, business, economic activities and military affairs of information and communication technology by (ICT) necessitates incorporation of cyber technology into our strategic calculation. Cyber power is exerting itself as a key lever in the development and execution of national policy, including counter-terrorism, economic growth, and diplomatic affairs.
        Export Export
11
ID:   182707


Leveraging cyber power: a study of the approaches and responses of the major powers / Samuel, Cherian 2021  Book
Samuel, Cherian Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, MP-IDSA, 2021.
Description 105p.pbk
Series MP-IDSA Monograph Series no.;73
Standard Number 9789382169994
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
060110303.4833/SAM 060110MainOn ShelfGeneral 
060111303.4833/SAM 060111MainOn ShelfGeneral 
12
ID:   102410


Mobilising cyber power / Klimburg, Alexander   Journal Article
Klimburg, Alexander Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract Cyber crime, cyber terrorism and cyber warfare share a common technological basis, tools, logistics and operational methods. They can also share the same social networks and have comparable goals. The differences between these categories of cyber activity are often razor thin, or only in the eye of the beholder. From the perspective of a cyber warrior, cyber crime can offer the technical basis (software tools and logistic support) and cyber terrorism the social basis (personal networks and motivation)with which to execute attacks on the computer networks of enemy groups or nations.
Key Words CIA  United States  China  Russia  Cyber crime  Cyber Warfare 
Cyber Terrorism  Cyber Power  Cyberattacks 
        Export Export
13
ID:   097950


New interpretations of cyber power / Lan, Tang   Journal Article
Lan, Tang Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
14
ID:   128829


Repurposing cyber command / Cilluffo, Frank J; Clark, Joseph R   Journal Article
Cilluffo, Frank J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013-14.
Summary/Abstract Recent debate about the organizational relationship between cyber command and the NSA stress political issues over force employment. This article focuses on the latter, making the case that cyber command should be split from the NSA, because nations that marshal and molilize their cyber power and integrate it into strategy and doctrine will ensure significant national security advantage. Cyber command provides the best route for developing the tactics, technique, and procedures necessary for achieving these goals.
        Export Export
15
ID:   193169


Strategic studies and cyber warfare / Zilincik, Samuel; Duyvesteyn, Isabelle   Journal Article
Duyvesteyn, Isabelle Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article explores the fashion/popularity of the idea that the exercise of cyber power is a form of warfare. Specifically, the article explains the recent decline of the cyber warfare fashion in academia and discusses its implications for strategic studies. To achieve this, we synthesize observations from previous studies with new quantitative and qualitative data. The article contributes to a growing body of literature by tracing and explaining the history of a particular theme within strategic studies.
Key Words Cyber Warfare  Cyber War  Strategic Studies  Cyber Power  Fashion 
        Export Export
16
ID:   186083


Technology is awesome, but so what?! exploring the relevance of technologically inspired awe to the construction of military the / Zilincik, Samuel   Journal Article
Zilincik, Samuel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Military theories are thoughts explaining how armed forces are to be used to achieve objectives. These thoughts are often influenced by emotions, yet the influence of emotions on military theory-crafting remains underexplored. This article fills the gap by exploring how awe influences military theorising. Awe is an emotion associated with the feeling of transcendence. Several military theorists felt that way about the technologies of air power, nuclear power and cyber power, respectively. Consequently, their theories became narrowly focused, technocentric and detached from the previous theories and military history. Understanding these tendencies can help improve military theorising in the future.
Key Words Nuclear Power  Awe  Military Theory  Cyber Power  Air Power 
        Export Export