Escalation dynamics in cyberspace:
"This book challenges the conventional wisdom-one that has long been asserted by policymakers and cyber experts alike-that cyberspace is a dangerous environment prone to escalation. Rather than triggering increasingly severe patterns of violence, the evidence shows that cyber actions and respon...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Oxford University Press
2023
|
Schriftenreihe: | Bridging the gap series
|
Schlagworte: | |
Zusammenfassung: | "This book challenges the conventional wisdom-one that has long been asserted by policymakers and cyber experts alike-that cyberspace is a dangerous environment prone to escalation. Rather than triggering increasingly severe patterns of violence, the evidence shows that cyber actions and responses generally follow a proportionate, tit-for-tat dynamic. Therefore, this book offers a theoretical framework that draws on core conceptions in security studies and extends their logic to the cyber domain to explain the general absence of cyber escalation. In doing so, it draws on central characteristics of cyber operations that the authors argue mitigate pathways to escalation and dampen the potential for strategic interactions between rival states in cyberspace to intensify. In the book, the theory's logic is also extended to explore the conditions under which cyber operations could contribute to the de-escalation of crises, as well as articulate proposition for specific scenarios in which-despite the overall low probability-escalation could nevertheless occur. In this sense, the book offers a comprehensive perspective on the nature of cyber escalation across the spectrum from competition to crisis and conflict. It not only seeks to interrogate long-held assumptions about escalation in cyberspace, but also to reframe the conversation away from binary debates about whether or not escalation is likely and instead identify the conditions under which escalation-or de-escalation-may be more or less likely as a result of cyber operations. To evaluate these arguments, the authors assess cyber behavior in the context of a number of different crises and strategic rivalries, with deep dives into several dyads involving the United States and its rivals. The question of whether cyberspace is escalatory is not one of mere semantics or academic inquiry; [...]." |
Beschreibung: | Includes index |
Beschreibung: | XII, 255 Seiten |
ISBN: | 9780197550892 9780197550885 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049039682 | ||
003 | DE-604 | ||
005 | 20230823 | ||
007 | t | ||
008 | 230706s2023 |||| 00||| eng d | ||
020 | |a 9780197550892 |c pbk |9 9780197550892 | ||
020 | |a 9780197550885 |c hbk |9 9780197550885 | ||
035 | |a (OCoLC)1371239766 | ||
035 | |a (DE-599)KXP1828169293 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
082 | 0 | |a 355.40285 |2 23 | |
100 | 1 | |a Lonergan, Erica D. |e Verfasser |0 (DE-588)1292817259 |4 aut | |
245 | 1 | 0 | |a Escalation dynamics in cyberspace |c Erica D. Lonergan, Shawn W. Lonergan |
264 | 1 | |a New York, NY |b Oxford University Press |c 2023 | |
300 | |a XII, 255 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Bridging the gap series | |
500 | |a Includes index | ||
520 | 3 | |a "This book challenges the conventional wisdom-one that has long been asserted by policymakers and cyber experts alike-that cyberspace is a dangerous environment prone to escalation. Rather than triggering increasingly severe patterns of violence, the evidence shows that cyber actions and responses generally follow a proportionate, tit-for-tat dynamic. Therefore, this book offers a theoretical framework that draws on core conceptions in security studies and extends their logic to the cyber domain to explain the general absence of cyber escalation. In doing so, it draws on central characteristics of cyber operations that the authors argue mitigate pathways to escalation and dampen the potential for strategic interactions between rival states in cyberspace to intensify. In the book, the theory's logic is also extended to explore the conditions under which cyber operations could contribute to the de-escalation of crises, as well as articulate proposition for specific scenarios in which-despite the overall low probability-escalation could nevertheless occur. In this sense, the book offers a comprehensive perspective on the nature of cyber escalation across the spectrum from competition to crisis and conflict. It not only seeks to interrogate long-held assumptions about escalation in cyberspace, but also to reframe the conversation away from binary debates about whether or not escalation is likely and instead identify the conditions under which escalation-or de-escalation-may be more or less likely as a result of cyber operations. To evaluate these arguments, the authors assess cyber behavior in the context of a number of different crises and strategic rivalries, with deep dives into several dyads involving the United States and its rivals. The question of whether cyberspace is escalatory is not one of mere semantics or academic inquiry; [...]." | |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Krise |0 (DE-588)4033203-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eskalation |0 (DE-588)4153029-9 |2 gnd |9 rswk-swf |
653 | 0 | |a Cyberspace operations (Military science) | |
653 | 0 | |a Escalation (Military science) | |
653 | 0 | |a Cyberspace operations (Military science) | |
653 | 0 | |a Escalation (Military science) | |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Eskalation |0 (DE-588)4153029-9 |D s |
689 | 0 | 2 | |a Krise |0 (DE-588)4033203-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9780197550915 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034302257 |
Datensatz im Suchindex
_version_ | 1804185331446054912 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Lonergan, Erica D. |
author_GND | (DE-588)1292817259 |
author_facet | Lonergan, Erica D. |
author_role | aut |
author_sort | Lonergan, Erica D. |
author_variant | e d l ed edl |
building | Verbundindex |
bvnumber | BV049039682 |
ctrlnum | (OCoLC)1371239766 (DE-599)KXP1828169293 |
dewey-full | 355.40285 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.40285 |
dewey-search | 355.40285 |
dewey-sort | 3355.40285 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
discipline_str_mv | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03411nam a2200457 c 4500</leader><controlfield tag="001">BV049039682</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230823 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230706s2023 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780197550892</subfield><subfield code="c">pbk</subfield><subfield code="9">9780197550892</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780197550885</subfield><subfield code="c">hbk</subfield><subfield code="9">9780197550885</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1371239766</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1828169293</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.40285</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lonergan, Erica D.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1292817259</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Escalation dynamics in cyberspace</subfield><subfield code="c">Erica D. Lonergan, Shawn W. Lonergan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 255 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Bridging the gap series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book challenges the conventional wisdom-one that has long been asserted by policymakers and cyber experts alike-that cyberspace is a dangerous environment prone to escalation. Rather than triggering increasingly severe patterns of violence, the evidence shows that cyber actions and responses generally follow a proportionate, tit-for-tat dynamic. Therefore, this book offers a theoretical framework that draws on core conceptions in security studies and extends their logic to the cyber domain to explain the general absence of cyber escalation. In doing so, it draws on central characteristics of cyber operations that the authors argue mitigate pathways to escalation and dampen the potential for strategic interactions between rival states in cyberspace to intensify. In the book, the theory's logic is also extended to explore the conditions under which cyber operations could contribute to the de-escalation of crises, as well as articulate proposition for specific scenarios in which-despite the overall low probability-escalation could nevertheless occur. In this sense, the book offers a comprehensive perspective on the nature of cyber escalation across the spectrum from competition to crisis and conflict. It not only seeks to interrogate long-held assumptions about escalation in cyberspace, but also to reframe the conversation away from binary debates about whether or not escalation is likely and instead identify the conditions under which escalation-or de-escalation-may be more or less likely as a result of cyber operations. To evaluate these arguments, the authors assess cyber behavior in the context of a number of different crises and strategic rivalries, with deep dives into several dyads involving the United States and its rivals. The question of whether cyberspace is escalatory is not one of mere semantics or academic inquiry; [...]."</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Krise</subfield><subfield code="0">(DE-588)4033203-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eskalation</subfield><subfield code="0">(DE-588)4153029-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Escalation (Military science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Escalation (Military science)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eskalation</subfield><subfield code="0">(DE-588)4153029-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Krise</subfield><subfield code="0">(DE-588)4033203-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9780197550915</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034302257</subfield></datafield></record></collection> |
id | DE-604.BV049039682 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:18:37Z |
indexdate | 2024-07-10T09:53:32Z |
institution | BVB |
isbn | 9780197550892 9780197550885 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034302257 |
oclc_num | 1371239766 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XII, 255 Seiten |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Oxford University Press |
record_format | marc |
series2 | Bridging the gap series |
spelling | Lonergan, Erica D. Verfasser (DE-588)1292817259 aut Escalation dynamics in cyberspace Erica D. Lonergan, Shawn W. Lonergan New York, NY Oxford University Press 2023 XII, 255 Seiten txt rdacontent n rdamedia nc rdacarrier Bridging the gap series Includes index "This book challenges the conventional wisdom-one that has long been asserted by policymakers and cyber experts alike-that cyberspace is a dangerous environment prone to escalation. Rather than triggering increasingly severe patterns of violence, the evidence shows that cyber actions and responses generally follow a proportionate, tit-for-tat dynamic. Therefore, this book offers a theoretical framework that draws on core conceptions in security studies and extends their logic to the cyber domain to explain the general absence of cyber escalation. In doing so, it draws on central characteristics of cyber operations that the authors argue mitigate pathways to escalation and dampen the potential for strategic interactions between rival states in cyberspace to intensify. In the book, the theory's logic is also extended to explore the conditions under which cyber operations could contribute to the de-escalation of crises, as well as articulate proposition for specific scenarios in which-despite the overall low probability-escalation could nevertheless occur. In this sense, the book offers a comprehensive perspective on the nature of cyber escalation across the spectrum from competition to crisis and conflict. It not only seeks to interrogate long-held assumptions about escalation in cyberspace, but also to reframe the conversation away from binary debates about whether or not escalation is likely and instead identify the conditions under which escalation-or de-escalation-may be more or less likely as a result of cyber operations. To evaluate these arguments, the authors assess cyber behavior in the context of a number of different crises and strategic rivalries, with deep dives into several dyads involving the United States and its rivals. The question of whether cyberspace is escalatory is not one of mere semantics or academic inquiry; [...]." Cyberspace (DE-588)4266146-8 gnd rswk-swf Krise (DE-588)4033203-2 gnd rswk-swf Eskalation (DE-588)4153029-9 gnd rswk-swf Cyberspace operations (Military science) Escalation (Military science) Cyberspace (DE-588)4266146-8 s Eskalation (DE-588)4153029-9 s Krise (DE-588)4033203-2 s DE-604 Erscheint auch als Online-Ausgabe 9780197550915 |
spellingShingle | Lonergan, Erica D. Escalation dynamics in cyberspace Cyberspace (DE-588)4266146-8 gnd Krise (DE-588)4033203-2 gnd Eskalation (DE-588)4153029-9 gnd |
subject_GND | (DE-588)4266146-8 (DE-588)4033203-2 (DE-588)4153029-9 |
title | Escalation dynamics in cyberspace |
title_auth | Escalation dynamics in cyberspace |
title_exact_search | Escalation dynamics in cyberspace |
title_exact_search_txtP | Escalation dynamics in cyberspace |
title_full | Escalation dynamics in cyberspace Erica D. Lonergan, Shawn W. Lonergan |
title_fullStr | Escalation dynamics in cyberspace Erica D. Lonergan, Shawn W. Lonergan |
title_full_unstemmed | Escalation dynamics in cyberspace Erica D. Lonergan, Shawn W. Lonergan |
title_short | Escalation dynamics in cyberspace |
title_sort | escalation dynamics in cyberspace |
topic | Cyberspace (DE-588)4266146-8 gnd Krise (DE-588)4033203-2 gnd Eskalation (DE-588)4153029-9 gnd |
topic_facet | Cyberspace Krise Eskalation |
work_keys_str_mv | AT lonerganericad escalationdynamicsincyberspace |