Cyber strategy: the evolving character of power and coercion
"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range o...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Oxford University Press
[2018]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"... |
Beschreibung: | Includes bibliographical references (pages 257-290) and index |
Beschreibung: | xii, 395 Seiten Diagramme 25 cm |
ISBN: | 9780190618094 0190618094 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045157843 | ||
003 | DE-604 | ||
005 | 20181005 | ||
007 | t | ||
008 | 180830s2018 xxu|||| |||| 00||| eng d | ||
010 | |a 017057806 | ||
020 | |a 9780190618094 |c hardback |9 978-0-19-061809-4 | ||
020 | |a 0190618094 |c hardback |9 0-19-061809-4 | ||
035 | |a (OCoLC)1055861777 | ||
035 | |a (DE-599)BVBBV045157843 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-706 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 327.120285/4678 |2 23 | |
100 | 1 | |a Valeriano, Brandon |e Verfasser |0 (DE-588)1135154120 |4 aut | |
245 | 1 | 0 | |a Cyber strategy |b the evolving character of power and coercion |c Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness |
264 | 1 | |a New York, NY |b Oxford University Press |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xii, 395 Seiten |b Diagramme |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 257-290) and index | ||
520 | |a "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"... | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Information warfare |v Case studies | |
650 | 4 | |a Cyberspace operations (Military science) | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberterrorismus |0 (DE-588)1118882725 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 2 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 3 | |a Cyberterrorismus |0 (DE-588)1118882725 |D s |
689 | 0 | 4 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jensen, Benjamin M. |e Verfasser |0 (DE-588)1096341387 |4 aut | |
700 | 1 | |a Maness, Ryan C. |e Verfasser |0 (DE-588)1073156915 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |a Valeriano, Brandon, author |t Cyber coercion |d New York, NY : Oxford University Press, [2018] |z 9780190618100 |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030547403&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
940 | 1 | |n oe | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030547403 | ||
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090511 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |
Datensatz im Suchindex
_version_ | 1804178835379322880 |
---|---|
adam_text | CYBER COERCION
/ VALERIANO, BRANDONYYEAUTHOR
: 2018
TABLE OF CONTENTS / INHALTSVERZEICHNIS
HOW RIVAL STATES EMPLOY CYBER STRATEGY : DISRUPTION, ESPIONAGE, AND
DEGRADATION
THE CORRELATES OF CYBER STRATEGY
CYBER COERCION AS A COMBINED STRATEGY
COMMISSARS AND CROOKS : RUSSIAN CYBER COERCION
CHINA AND THE TECHNOLOGY GAP : CHINESE STRATEGIC BEHAVIOR IN CYBERSPACE
THE UNITED STATES : THE CYBER RECONNAISSANCE-STRIKE COMPLEX
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Valeriano, Brandon Jensen, Benjamin M. Maness, Ryan C. |
author_GND | (DE-588)1135154120 (DE-588)1096341387 (DE-588)1073156915 |
author_facet | Valeriano, Brandon Jensen, Benjamin M. Maness, Ryan C. |
author_role | aut aut aut |
author_sort | Valeriano, Brandon |
author_variant | b v bv b m j bm bmj r c m rc rcm |
building | Verbundindex |
bvnumber | BV045157843 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)1055861777 (DE-599)BVBBV045157843 |
dewey-full | 327.120285/4678 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.120285/4678 |
dewey-search | 327.120285/4678 |
dewey-sort | 3327.120285 44678 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04133nam a2200601 c 4500</leader><controlfield tag="001">BV045157843</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181005 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180830s2018 xxu|||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017057806</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780190618094</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-19-061809-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0190618094</subfield><subfield code="c">hardback</subfield><subfield code="9">0-19-061809-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1055861777</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045157843</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.120285/4678</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Valeriano, Brandon</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1135154120</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber strategy</subfield><subfield code="b">the evolving character of power and coercion</subfield><subfield code="c">Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 395 Seiten</subfield><subfield code="b">Diagramme</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 257-290) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jensen, Benjamin M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1096341387</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maness, Ryan C.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1073156915</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="a">Valeriano, Brandon, author</subfield><subfield code="t">Cyber coercion</subfield><subfield code="d">New York, NY : Oxford University Press, [2018]</subfield><subfield code="z">9780190618100</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030547403&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030547403</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090511</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield></datafield></record></collection> |
id | DE-604.BV045157843 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:10:17Z |
institution | BVB |
isbn | 9780190618094 0190618094 |
language | English |
lccn | 017057806 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030547403 |
oclc_num | 1055861777 |
open_access_boolean | |
owner | DE-12 DE-706 |
owner_facet | DE-12 DE-706 |
physical | xii, 395 Seiten Diagramme 25 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Oxford University Press |
record_format | marc |
spelling | Valeriano, Brandon Verfasser (DE-588)1135154120 aut Cyber strategy the evolving character of power and coercion Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness New York, NY Oxford University Press [2018] © 2018 xii, 395 Seiten Diagramme 25 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (pages 257-290) and index "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"... Cyberterrorism Information warfare Case studies Cyberspace operations (Military science) Computersicherheit (DE-588)4274324-2 gnd rswk-swf Cyberterrorismus (DE-588)1118882725 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s Sicherheitspolitik (DE-588)4116489-1 s Cyberterrorismus (DE-588)1118882725 s Information warfare (DE-588)4461975-3 s DE-604 Jensen, Benjamin M. Verfasser (DE-588)1096341387 aut Maness, Ryan C. Verfasser (DE-588)1073156915 aut Erscheint auch als Online-Ausgabe Valeriano, Brandon, author Cyber coercion New York, NY : Oxford University Press, [2018] 9780190618100 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030547403&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Valeriano, Brandon Jensen, Benjamin M. Maness, Ryan C. Cyber strategy the evolving character of power and coercion Cyberterrorism Information warfare Case studies Cyberspace operations (Military science) Computersicherheit (DE-588)4274324-2 gnd Cyberterrorismus (DE-588)1118882725 gnd Internetkriminalität (DE-588)7864395-8 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)1118882725 (DE-588)7864395-8 (DE-588)4116489-1 (DE-588)4461975-3 |
title | Cyber strategy the evolving character of power and coercion |
title_auth | Cyber strategy the evolving character of power and coercion |
title_exact_search | Cyber strategy the evolving character of power and coercion |
title_full | Cyber strategy the evolving character of power and coercion Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness |
title_fullStr | Cyber strategy the evolving character of power and coercion Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness |
title_full_unstemmed | Cyber strategy the evolving character of power and coercion Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness |
title_short | Cyber strategy |
title_sort | cyber strategy the evolving character of power and coercion |
title_sub | the evolving character of power and coercion |
topic | Cyberterrorism Information warfare Case studies Cyberspace operations (Military science) Computersicherheit (DE-588)4274324-2 gnd Cyberterrorismus (DE-588)1118882725 gnd Internetkriminalität (DE-588)7864395-8 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Cyberterrorism Information warfare Case studies Cyberspace operations (Military science) Computersicherheit Cyberterrorismus Internetkriminalität Sicherheitspolitik Information warfare |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030547403&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT valerianobrandon cyberstrategytheevolvingcharacterofpowerandcoercion AT jensenbenjaminm cyberstrategytheevolvingcharacterofpowerandcoercion AT manessryanc cyberstrategytheevolvingcharacterofpowerandcoercion |