Query Result Set
Skip Navigation Links
   ActiveUsers:1774Hits:19223019Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
COMPUTER NETWORK ATTACK (3) answer(s).
 
SrlItem
1
ID:   150089


Ending cyber coercion: computer network attack, exploitation and the case of North Korea / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The use of coercive instruments of statecraft and military power to affect changes in strategic behavior is a common feature of international politics. Recently, a variety of state and sub-state actors have attempted to utilize cyber instruments of disruption and intrusion to bring about favorable outcomes. This article notes that digital instruments for coercion offer limited potential for effective compellent effect in world affairs. Nevertheless, as the case of North Korea's 2015 hack and (attempted) manipulation of Sony demonstrates, coercion using cyber weapons of intrusion and disruption is possible under particular conditions. In describing these conditions, I argue that the limits of cyber coercion should be seen more as a function of relevant social and institutional context than of the current state of technological possibilities. Technology certainly determines parameters of coercive interaction between actors, but success—and thus most determinants of strategic decisions surrounding cyber coercion—derives directly from sociopolitical context.
        Export Export
2
ID:   120290


How probable is Cyber war? bringing IR theory back in to the cy / Junio, Timothy J   Journal Article
Junio, Timothy J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example - principal-agent problems in cyber operations - to demonstrate how rigorous theoretical and empirical work may proceed.
        Export Export
3
ID:   122056


Offensive cyber for the joint force commander: it's not that different / Carter, Rosemary M; Feick, Brent; Undersander, Roy C   Journal Article
Carter, Rosemary M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export