Query Result Set
SLIM21 Home
Advanced Search
My Info
Browse
Arrivals
Expected
Reference Items
Journal List
Proposals
Media List
Rules
ActiveUsers:1774
Hits:19223019
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
Help
Topics
Tutorial
Advanced search
Hide Options
Sort Order
Natural
Author / Creator, Title
Title
Item Type, Author / Creator, Title
Item Type, Title
Subject, Item Type, Author / Creator, Title
Item Type, Subject, Author / Creator, Title
Publication Date, Title
Items / Page
5
10
15
20
Modern View
COMPUTER NETWORK ATTACK
(3)
answer(s).
Srl
Item
1
ID:
150089
Ending cyber coercion: computer network attack, exploitation and the case of North Korea
/ Whyte, Christopher
Whyte, Christopher
Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract
The use of coercive instruments of statecraft and military power to affect changes in strategic behavior is a common feature of international politics. Recently, a variety of state and sub-state actors have attempted to utilize cyber instruments of disruption and intrusion to bring about favorable outcomes. This article notes that digital instruments for coercion offer limited potential for effective compellent effect in world affairs. Nevertheless, as the case of North Korea's 2015 hack and (attempted) manipulation of Sony demonstrates, coercion using cyber weapons of intrusion and disruption is possible under particular conditions. In describing these conditions, I argue that the limits of cyber coercion should be seen more as a function of relevant social and institutional context than of the current state of technological possibilities. Technology certainly determines parameters of coercive interaction between actors, but success—and thus most determinants of strategic decisions surrounding cyber coercion—derives directly from sociopolitical context.
Key Words
North Korea
;
Cyber Attack
;
Computer Network Attack
;
Cyber Coercion
Links
'Full Text'
In Basket
Export
2
ID:
120290
How probable is Cyber war? bringing IR theory back in to the cy
/ Junio, Timothy J
Junio, Timothy J
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2013.
Summary/Abstract
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example - principal-agent problems in cyber operations - to demonstrate how rigorous theoretical and empirical work may proceed.
Key Words
Information Technology
;
Cyber War
;
Principal - Agent
;
Computer Network Attack
;
Command and Control
Links
'Full Text'
In Basket
Export
3
ID:
122056
Offensive cyber for the joint force commander: it's not that different
/ Carter, Rosemary M; Feick, Brent; Undersander, Roy C
Carter, Rosemary M
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2012.
Key Words
NATO
;
United States
;
Russia
;
Georgia
;
Cyber Attack
;
Cyber Policy
;
Computer Network Attack
;
Offensive Cyber
;
Cyber Warriors
;
Cyber Domain
In Basket
Export