Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Cyber Strategy

The Evolving Character of Power and Coercion
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780190618117
Veröffentl:
2018
Seiten:
288
Autor:
Brandon Valeriano
eBook Typ:
EPUB
eBook Format:
EPUB
Kopierschutz:
2 - DRM Adobe
Sprache:
Englisch
Beschreibung:

Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to achieve a position of advantage against rival states?This book examines the emerging art of cyber strategy and its integration as part of a larger approach to coercion by states in the international system between 2000 and 2014. To this end, the book establishes a theoretical framework in the coercion literature for evaluating the efficacy of cyber operations. Cyber coercion represents the use of manipulation, denial, and punishment strategies in the digital frontier to achieve some strategic end. As a contemporary form of covert action and political warfare, cyber operations rarely produce concessions and tend to achieve only limited, signaling objectives. When cyber operations do produce concessions between rival states, they tend to be part of a larger integrated coercive strategy that combines network intrusions with other traditional forms of statecraft such as military threats, economic sanctions, and diplomacy. The books finds that cyber operations rarely produce concessions in isolation. They are additive instruments that complement traditional statecraft and coercive diplomacy.The book combines an analysis of cyber exchanges between rival states and broader event data on political, military, and economic interactions with case studies on the leading cyber powers: Russia, China, and the United States. The authors investigate cyber strategies in their integrated and isolated contexts, demonstrating that they are useful for maximizing informational asymmetries and disruptions, and thus are important, but limited coercive tools. This empirical foundation allows the authors to explore how leading actors employ cyber strategy and the implications for international relations in the 21st century. While most military plans involving cyber attributes remain highly classified, the authors piece together strategies based on observations of attacks over time and through the policy discussion in unclassified space. The result will be the first broad evaluation of the efficacy of various strategic options in a digital world.
PrefaceAcknowledgementsChapter 1 - Introduction: Are Cyber Strategies Coercive?Chapter 2 - How Rival States Employ Cyber Strategy: Disruption, Espionage, and DegradationChapter 3 - The Correlates of Cyber StrategyChapter 4 - Cyber Coercion as a Combined StrategyChapter 5 - Commissars and Crooks: Russian Cyber CoercionChapter 6 - China and the Technology Gap: Chinese Strategic Behavior in CyberspaceChapter 7 - The United States: The Cyber Reconnaissance-Strike ComplexChapter 8 - Conclusion: Cyber Political Warfare with Limited EffectsAppendix 1: The Dyadic Cyber Incident and Dispute Dataset Version 1.1Appendix 2: Cyber Strategy SummaryAppendix 3: The Dyadic Cyber Incident and Dispute Dataset (DCID), version 1.1, summarized versionNotesBibliographyIndex

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga