Cyber war versus cyber realities :: cyber conflict in the international system /
"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range o...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Oxford ; New York :
Oxford University Press,
2015.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"-- "What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"-- |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 019020480X 9780190204808 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn907445343 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 150415s2015 enk ob 001 0 eng d | ||
040 | |a YDXCP |b eng |e rda |e pn |c YDXCP |d OCLCO |d E7B |d OH1 |d VLB |d OCLCF |d EBLCP |d CUS |d OCLCQ |d OCLCA |d N$T |d OCLCQ |d WYU |d C6I |d OCLCQ |d S2H |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d SFB |d OCLCQ |d PSYSI |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 922973357 | ||
020 | |a 019020480X |q (electronic bk.) | ||
020 | |a 9780190204808 |q (electronic bk.) | ||
020 | |z 9780190204792 |q (hardback) | ||
020 | |z 0190204796 |q (hardback) | ||
035 | |a (OCoLC)907445343 |z (OCoLC)922973357 | ||
050 | 4 | |a U163 |b .V36 2015 | |
072 | 7 | |a HIS |x 027130 |2 bisacsh | |
072 | 7 | |a TEC |x 025000 |2 bisacsh | |
082 | 7 | |a 355.4 |2 23 | |
084 | |a POL011000 |a POL012000 |2 bisacsh | ||
049 | |a MAIN | ||
100 | 1 | |a Valeriano, Brandon, |e author. |0 http://id.loc.gov/authorities/names/no2004042698 | |
245 | 1 | 0 | |a Cyber war versus cyber realities : |b cyber conflict in the international system / |c Brandon Valeriano, Ryan C. Maness. |
246 | 3 | 0 | |a Cyber conflict in the international system |
264 | 1 | |a Oxford ; |a New York : |b Oxford University Press, |c 2015. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"-- |c Provided by publisher | ||
520 | |a "What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"-- |c Provided by publisher | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover -- Cyber War versus Cyber Realities -- Copyright -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 The Contours of the Cyber Conflict World -- 2 Cyber Power, Cyber Weapons, and Cyber Operations -- 3 Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- 4 The Dynamics of Cyber Conflict Between Rival Antagonists -- 5 The Impact of Cyber Actions: Cyber Events and the Conflict-Cooperation Nexus -- 6 Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations | |
505 | 8 | |a 7 Cyber Conflict and Non-State Actors:Â Weapons of Fear8 Cyber Rules:Â Encouraging a System of Justice and Proportionality in Cyber Operations -- 9 Conclusion -- Appendix: Research Methods -- Notes -- References -- Index | |
650 | 0 | |a Cyberspace operations (Military science) |0 http://id.loc.gov/authorities/subjects/sh2013000988 | |
650 | 0 | |a Cyberterrorism. |0 http://id.loc.gov/authorities/subjects/sh00001974 | |
650 | 0 | |a Technology and international relations. |0 http://id.loc.gov/authorities/subjects/sh85133181 | |
650 | 0 | |a Internet and international relations. |0 http://id.loc.gov/authorities/subjects/sh2011003046 | |
650 | 6 | |a Cyberguerre (Science militaire) | |
650 | 6 | |a Cyberterrorisme. | |
650 | 6 | |a Technologie et relations internationales. | |
650 | 6 | |a Internet et relations internationales. | |
650 | 7 | |a POLITICAL SCIENCE |x International Relations |x General. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x International Security. |2 bisacsh | |
650 | 7 | |a HISTORY |x Military |x Other. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Military Science. |2 bisacsh | |
650 | 7 | |a Cyberspace operations (Military science) |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Internet and international relations |2 fast | |
650 | 7 | |a Technology and international relations |2 fast | |
700 | 1 | |a Maness, Ryan C., |e author. | |
758 | |i has work: |a Cyber war versus cyber realities (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGxR4Yk4FGBFXG9ThWT3pP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Valeriano, Brandon. |t Cyber war versus cyber realities. |z 9780190204792 |z 0190204796 |w (DLC) 2014039240 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=970403 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL3056544 | ||
938 | |a ebrary |b EBRY |n ebr11035855 | ||
938 | |a EBSCOhost |b EBSC |n 970403 | ||
938 | |a YBP Library Services |b YANK |n 12357367 | ||
938 | |a YBP Library Services |b YANK |n 12251225 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn907445343 |
---|---|
_version_ | 1816882310340935680 |
adam_text | |
any_adam_object | |
author | Valeriano, Brandon Maness, Ryan C. |
author_GND | http://id.loc.gov/authorities/names/no2004042698 |
author_facet | Valeriano, Brandon Maness, Ryan C. |
author_role | aut aut |
author_sort | Valeriano, Brandon |
author_variant | b v bv r c m rc rcm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 .V36 2015 |
callnumber-search | U163 .V36 2015 |
callnumber-sort | U 3163 V36 42015 |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | Cover -- Cyber War versus Cyber Realities -- Copyright -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 The Contours of the Cyber Conflict World -- 2 Cyber Power, Cyber Weapons, and Cyber Operations -- 3 Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- 4 The Dynamics of Cyber Conflict Between Rival Antagonists -- 5 The Impact of Cyber Actions: Cyber Events and the Conflict-Cooperation Nexus -- 6 Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations 7 Cyber Conflict and Non-State Actors: Weapons of Fear8 Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- 9 Conclusion -- Appendix: Research Methods -- Notes -- References -- Index |
ctrlnum | (OCoLC)907445343 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06391cam a2200733 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn907445343</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">150415s2015 enk ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDXCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">YDXCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">E7B</subfield><subfield code="d">OH1</subfield><subfield code="d">VLB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">EBLCP</subfield><subfield code="d">CUS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">C6I</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">S2H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">PSYSI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">922973357</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">019020480X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780190204808</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780190204792</subfield><subfield code="q">(hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0190204796</subfield><subfield code="q">(hardback)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)907445343</subfield><subfield code="z">(OCoLC)922973357</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.V36 2015</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027130</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">025000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">POL011000</subfield><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Valeriano, Brandon,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004042698</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber war versus cyber realities :</subfield><subfield code="b">cyber conflict in the international system /</subfield><subfield code="c">Brandon Valeriano, Ryan C. Maness.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Cyber conflict in the international system</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford ;</subfield><subfield code="a">New York :</subfield><subfield code="b">Oxford University Press,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--</subfield><subfield code="c">Provided by publisher</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--</subfield><subfield code="c">Provided by publisher</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Cyber War versus Cyber Realities -- Copyright -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 The Contours of the Cyber Conflict World -- 2 Cyber Power, Cyber Weapons, and Cyber Operations -- 3 Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- 4 The Dynamics of Cyber Conflict Between Rival Antagonists -- 5 The Impact of Cyber Actions: Cyber Events and the Conflict-Cooperation Nexus -- 6 Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7 Cyber Conflict and Non-State Actors: Weapons of Fear8 Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- 9 Conclusion -- Appendix: Research Methods -- Notes -- References -- Index</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000988</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00001974</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Technology and international relations.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85133181</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet and international relations.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003046</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberguerre (Science militaire)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie et relations internationales.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet et relations internationales.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">International Relations</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">International Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY</subfield><subfield code="x">Military</subfield><subfield code="x">Other.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Military Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet and international relations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology and international relations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maness, Ryan C.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber war versus cyber realities (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGxR4Yk4FGBFXG9ThWT3pP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Valeriano, Brandon.</subfield><subfield code="t">Cyber war versus cyber realities.</subfield><subfield code="z">9780190204792</subfield><subfield code="z">0190204796</subfield><subfield code="w">(DLC) 2014039240</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=970403</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL3056544</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr11035855</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">970403</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12357367</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12251225</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn907445343 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:26:34Z |
institution | BVB |
isbn | 019020480X 9780190204808 |
language | English |
oclc_num | 907445343 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Oxford University Press, |
record_format | marc |
spelling | Valeriano, Brandon, author. http://id.loc.gov/authorities/names/no2004042698 Cyber war versus cyber realities : cyber conflict in the international system / Brandon Valeriano, Ryan C. Maness. Cyber conflict in the international system Oxford ; New York : Oxford University Press, 2015. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"-- Provided by publisher "What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"-- Provided by publisher Print version record. Cover -- Cyber War versus Cyber Realities -- Copyright -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 The Contours of the Cyber Conflict World -- 2 Cyber Power, Cyber Weapons, and Cyber Operations -- 3 Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- 4 The Dynamics of Cyber Conflict Between Rival Antagonists -- 5 The Impact of Cyber Actions: Cyber Events and the Conflict-Cooperation Nexus -- 6 Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations 7 Cyber Conflict and Non-State Actors: Weapons of Fear8 Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- 9 Conclusion -- Appendix: Research Methods -- Notes -- References -- Index Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Technology and international relations. http://id.loc.gov/authorities/subjects/sh85133181 Internet and international relations. http://id.loc.gov/authorities/subjects/sh2011003046 Cyberguerre (Science militaire) Cyberterrorisme. Technologie et relations internationales. Internet et relations internationales. POLITICAL SCIENCE International Relations General. bisacsh POLITICAL SCIENCE Political Freedom & Security International Security. bisacsh HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace operations (Military science) fast Cyberterrorism fast Internet and international relations fast Technology and international relations fast Maness, Ryan C., author. has work: Cyber war versus cyber realities (Text) https://id.oclc.org/worldcat/entity/E39PCGxR4Yk4FGBFXG9ThWT3pP https://id.oclc.org/worldcat/ontology/hasWork Print version: Valeriano, Brandon. Cyber war versus cyber realities. 9780190204792 0190204796 (DLC) 2014039240 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=970403 Volltext |
spellingShingle | Valeriano, Brandon Maness, Ryan C. Cyber war versus cyber realities : cyber conflict in the international system / Cover -- Cyber War versus Cyber Realities -- Copyright -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 The Contours of the Cyber Conflict World -- 2 Cyber Power, Cyber Weapons, and Cyber Operations -- 3 Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- 4 The Dynamics of Cyber Conflict Between Rival Antagonists -- 5 The Impact of Cyber Actions: Cyber Events and the Conflict-Cooperation Nexus -- 6 Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations 7 Cyber Conflict and Non-State Actors: Weapons of Fear8 Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- 9 Conclusion -- Appendix: Research Methods -- Notes -- References -- Index Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Technology and international relations. http://id.loc.gov/authorities/subjects/sh85133181 Internet and international relations. http://id.loc.gov/authorities/subjects/sh2011003046 Cyberguerre (Science militaire) Cyberterrorisme. Technologie et relations internationales. Internet et relations internationales. POLITICAL SCIENCE International Relations General. bisacsh POLITICAL SCIENCE Political Freedom & Security International Security. bisacsh HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace operations (Military science) fast Cyberterrorism fast Internet and international relations fast Technology and international relations fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013000988 http://id.loc.gov/authorities/subjects/sh00001974 http://id.loc.gov/authorities/subjects/sh85133181 http://id.loc.gov/authorities/subjects/sh2011003046 |
title | Cyber war versus cyber realities : cyber conflict in the international system / |
title_alt | Cyber conflict in the international system |
title_auth | Cyber war versus cyber realities : cyber conflict in the international system / |
title_exact_search | Cyber war versus cyber realities : cyber conflict in the international system / |
title_full | Cyber war versus cyber realities : cyber conflict in the international system / Brandon Valeriano, Ryan C. Maness. |
title_fullStr | Cyber war versus cyber realities : cyber conflict in the international system / Brandon Valeriano, Ryan C. Maness. |
title_full_unstemmed | Cyber war versus cyber realities : cyber conflict in the international system / Brandon Valeriano, Ryan C. Maness. |
title_short | Cyber war versus cyber realities : |
title_sort | cyber war versus cyber realities cyber conflict in the international system |
title_sub | cyber conflict in the international system / |
topic | Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Technology and international relations. http://id.loc.gov/authorities/subjects/sh85133181 Internet and international relations. http://id.loc.gov/authorities/subjects/sh2011003046 Cyberguerre (Science militaire) Cyberterrorisme. Technologie et relations internationales. Internet et relations internationales. POLITICAL SCIENCE International Relations General. bisacsh POLITICAL SCIENCE Political Freedom & Security International Security. bisacsh HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace operations (Military science) fast Cyberterrorism fast Internet and international relations fast Technology and international relations fast |
topic_facet | Cyberspace operations (Military science) Cyberterrorism. Technology and international relations. Internet and international relations. Cyberguerre (Science militaire) Cyberterrorisme. Technologie et relations internationales. Internet et relations internationales. POLITICAL SCIENCE International Relations General. POLITICAL SCIENCE Political Freedom & Security International Security. HISTORY Military Other. TECHNOLOGY & ENGINEERING Military Science. Cyberterrorism Internet and international relations Technology and international relations |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=970403 |
work_keys_str_mv | AT valerianobrandon cyberwarversuscyberrealitiescyberconflictintheinternationalsystem AT manessryanc cyberwarversuscyberrealitiescyberconflictintheinternationalsystem AT valerianobrandon cyberconflictintheinternationalsystem AT manessryanc cyberconflictintheinternationalsystem |