Cashing in on cyberpower :: how interdependent actors seek economic outcomes in a digital world /
As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enable actors to change actual economic outcomes without the massive resource investment required for military force deploy...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Lincoln, Nebraska] :
Potomac Books, an imprint of the University of Nebraska Press,
[2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enable actors to change actual economic outcomes without the massive resource investment required for military force deployments. Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values. Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes. -- Provided by publisher. |
Beschreibung: | 1 online resource (xii, 268 pages} |
Bibliographie: | Includes bibliographical references (pages 239-253) and index. |
ISBN: | 9781640120518 1640120513 9781640120532 164012053X 9781640120525 1640120521 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1029352671 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 180323s2018 nbu ob 001 0 eng d | ||
010 | |a 2017052149 | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d YDX |d P@U |d JSTOR |d OCLCF |d INT |d OCLCQ |d UX1 |d OCLCQ |d HF9 |d IBI |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1158038797 |a 1175638698 | ||
020 | |a 9781640120518 |q (electronic book) | ||
020 | |a 1640120513 |q (electronic book) | ||
020 | |a 9781640120532 |q (electronic book) | ||
020 | |a 164012053X |q (electronic book) | ||
020 | |a 9781640120525 |q (electronic book) | ||
020 | |a 1640120521 |q (electronic book) | ||
020 | |z 9781640120136 |q (hardcover) | ||
020 | |z 1640120130 |q (hardcover) | ||
035 | |a (OCoLC)1029352671 |z (OCoLC)1158038797 |z (OCoLC)1175638698 | ||
037 | |a 22573/ctt225b0st |b JSTOR | ||
050 | 4 | |a U167.5.C92 |b P47 2018eb | |
072 | 7 | |a SOC |x 004000 |2 bisacsh | |
072 | 7 | |a BUS |x 069020 |2 bisacsh | |
072 | 7 | |a POL |x 011000 |2 bisacsh | |
082 | 7 | |a 364.16/8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Peters, Mark T., |c II, |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjqYbdfY4HMPbhTJMpBQMP |0 http://id.loc.gov/authorities/names/n2017068888 | |
245 | 1 | 0 | |a Cashing in on cyberpower : |b how interdependent actors seek economic outcomes in a digital world / |c Mark T. Peters II. |
264 | 1 | |a [Lincoln, Nebraska] : |b Potomac Books, an imprint of the University of Nebraska Press, |c [2018] | |
300 | |a 1 online resource (xii, 268 pages} | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references (pages 239-253) and index. | ||
505 | 0 | |a 1. Entering the Cyber Commons -- Problem -- Research Question -- Interdependence and Power -- Method Development -- Cyber Application and Case Studies -- Summary -- 2. Interdependence -- Why Use Interdependence Theory? -- Interdependent Characteristics of the Virtual State -- Defining Interdependent Cyberspace -- Cyber Operations -- Summary -- 3. Power -- Types of Power -- Power Application -- Power through Economic Cyber Influences -- Summary -- 4. Method Development -- Method Types -- Describing the Data Sources -- Categorizing Cyber Events -- Case Study Guideline -- Summary -- 5. Cyber Applications -- Application in Practice -- Deciphering the Data -- Evaluating the First Four Hypotheses -- Summary 6. Case Study Analysis -- Deciphering Events through Narrative Linkages -- Japanese Government Case: Economic Espionage -- Ukrainian Power Grid Case: Economic Cyberattack -- Codan Case: Intellectual Property Theft -- Evaluating the Economic Hypotheses (H5, H6, H7, H8) -- Summary -- 7. Framing Future Channels -- Linking Hypotheses to the Research Question -- Future Applications -- Final Thoughts -- Appendix: Cyber Events | |
520 | |a As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enable actors to change actual economic outcomes without the massive resource investment required for military force deployments. Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values. Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes. -- Provided by publisher. | ||
650 | 0 | |a Cyberspace operations (Military science) |0 http://id.loc.gov/authorities/subjects/sh2013000988 | |
650 | 0 | |a Cyberterrorism |x Political aspects. | |
650 | 0 | |a Balance of power |x Economic aspects. | |
650 | 6 | |a Cyberguerre (Science militaire) | |
650 | 6 | |a Cyberterrorisme |x Aspect politique. | |
650 | 6 | |a Équilibre des puissances |x Aspect économique. | |
650 | 7 | |a SOCIAL SCIENCE |x Criminology. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x International |x Economics. |2 bisacsh | |
650 | 7 | |a Cyberspace operations (Military science) |2 fast | |
758 | |i has work: |a Cashing in on cyberpower (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG9FcyhMrDrPmDYxfRCG73 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Peters, Mark T., II. |t Cashing in on cyberpower. |d Lincoln : University of Nebraska Press, [2018] |z 9781640120136 |w (DLC) 2017052149 |w (OCoLC)1012715659 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1737410 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1737410 |3 Volltext | |
938 | |a EBSCOhost |b EBSC |n 1737410 | ||
938 | |a Project MUSE |b MUSE |n muse65923 | ||
938 | |a YBP Library Services |b YANK |n 15042205 | ||
938 | |a YBP Library Services |b YANK |n 15237148 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1029352671 |
---|---|
_version_ | 1813903786099343360 |
adam_text | |
any_adam_object | |
author | Peters, Mark T., II |
author_GND | http://id.loc.gov/authorities/names/n2017068888 |
author_facet | Peters, Mark T., II |
author_role | aut |
author_sort | Peters, Mark T., II |
author_variant | m t p mt mtp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U167 |
callnumber-raw | U167.5.C92 P47 2018eb |
callnumber-search | U167.5.C92 P47 2018eb |
callnumber-sort | U 3167.5 C92 P47 42018EB |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | 1. Entering the Cyber Commons -- Problem -- Research Question -- Interdependence and Power -- Method Development -- Cyber Application and Case Studies -- Summary -- 2. Interdependence -- Why Use Interdependence Theory? -- Interdependent Characteristics of the Virtual State -- Defining Interdependent Cyberspace -- Cyber Operations -- Summary -- 3. Power -- Types of Power -- Power Application -- Power through Economic Cyber Influences -- Summary -- 4. Method Development -- Method Types -- Describing the Data Sources -- Categorizing Cyber Events -- Case Study Guideline -- Summary -- 5. Cyber Applications -- Application in Practice -- Deciphering the Data -- Evaluating the First Four Hypotheses -- Summary 6. Case Study Analysis -- Deciphering Events through Narrative Linkages -- Japanese Government Case: Economic Espionage -- Ukrainian Power Grid Case: Economic Cyberattack -- Codan Case: Intellectual Property Theft -- Evaluating the Economic Hypotheses (H5, H6, H7, H8) -- Summary -- 7. Framing Future Channels -- Linking Hypotheses to the Research Question -- Future Applications -- Final Thoughts -- Appendix: Cyber Events |
ctrlnum | (OCoLC)1029352671 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05525cam a2200661 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1029352671</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">180323s2018 nbu ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2017052149</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">P@U</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UX1</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HF9</subfield><subfield code="d">IBI</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1158038797</subfield><subfield code="a">1175638698</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781640120518</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1640120513</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781640120532</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">164012053X</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781640120525</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1640120521</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781640120136</subfield><subfield code="q">(hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1640120130</subfield><subfield code="q">(hardcover)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1029352671</subfield><subfield code="z">(OCoLC)1158038797</subfield><subfield code="z">(OCoLC)1175638698</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt225b0st</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U167.5.C92</subfield><subfield code="b">P47 2018eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">069020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">011000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Peters, Mark T.,</subfield><subfield code="c">II,</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjqYbdfY4HMPbhTJMpBQMP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2017068888</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cashing in on cyberpower :</subfield><subfield code="b">how interdependent actors seek economic outcomes in a digital world /</subfield><subfield code="c">Mark T. Peters II.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Lincoln, Nebraska] :</subfield><subfield code="b">Potomac Books, an imprint of the University of Nebraska Press,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 268 pages}</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 239-253) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Entering the Cyber Commons -- Problem -- Research Question -- Interdependence and Power -- Method Development -- Cyber Application and Case Studies -- Summary -- 2. Interdependence -- Why Use Interdependence Theory? -- Interdependent Characteristics of the Virtual State -- Defining Interdependent Cyberspace -- Cyber Operations -- Summary -- 3. Power -- Types of Power -- Power Application -- Power through Economic Cyber Influences -- Summary -- 4. Method Development -- Method Types -- Describing the Data Sources -- Categorizing Cyber Events -- Case Study Guideline -- Summary -- 5. Cyber Applications -- Application in Practice -- Deciphering the Data -- Evaluating the First Four Hypotheses -- Summary 6. Case Study Analysis -- Deciphering Events through Narrative Linkages -- Japanese Government Case: Economic Espionage -- Ukrainian Power Grid Case: Economic Cyberattack -- Codan Case: Intellectual Property Theft -- Evaluating the Economic Hypotheses (H5, H6, H7, H8) -- Summary -- 7. Framing Future Channels -- Linking Hypotheses to the Research Question -- Future Applications -- Final Thoughts -- Appendix: Cyber Events</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enable actors to change actual economic outcomes without the massive resource investment required for military force deployments. Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values. Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes. -- Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000988</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Political aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Balance of power</subfield><subfield code="x">Economic aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberguerre (Science militaire)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme</subfield><subfield code="x">Aspect politique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Équilibre des puissances</subfield><subfield code="x">Aspect économique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">Criminology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">International</subfield><subfield code="x">Economics.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cashing in on cyberpower (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG9FcyhMrDrPmDYxfRCG73</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Peters, Mark T., II.</subfield><subfield code="t">Cashing in on cyberpower.</subfield><subfield code="d">Lincoln : University of Nebraska Press, [2018]</subfield><subfield code="z">9781640120136</subfield><subfield code="w">(DLC) 2017052149</subfield><subfield code="w">(OCoLC)1012715659</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1737410</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1737410</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1737410</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Project MUSE</subfield><subfield code="b">MUSE</subfield><subfield code="n">muse65923</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15042205</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15237148</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1029352671 |
illustrated | Not Illustrated |
indexdate | 2024-10-25T16:24:13Z |
institution | BVB |
isbn | 9781640120518 1640120513 9781640120532 164012053X 9781640120525 1640120521 |
language | English |
lccn | 2017052149 |
oclc_num | 1029352671 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xii, 268 pages} |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Potomac Books, an imprint of the University of Nebraska Press, |
record_format | marc |
spelling | Peters, Mark T., II, author. https://id.oclc.org/worldcat/entity/E39PCjqYbdfY4HMPbhTJMpBQMP http://id.loc.gov/authorities/names/n2017068888 Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / Mark T. Peters II. [Lincoln, Nebraska] : Potomac Books, an imprint of the University of Nebraska Press, [2018] 1 online resource (xii, 268 pages} text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Includes bibliographical references (pages 239-253) and index. 1. Entering the Cyber Commons -- Problem -- Research Question -- Interdependence and Power -- Method Development -- Cyber Application and Case Studies -- Summary -- 2. Interdependence -- Why Use Interdependence Theory? -- Interdependent Characteristics of the Virtual State -- Defining Interdependent Cyberspace -- Cyber Operations -- Summary -- 3. Power -- Types of Power -- Power Application -- Power through Economic Cyber Influences -- Summary -- 4. Method Development -- Method Types -- Describing the Data Sources -- Categorizing Cyber Events -- Case Study Guideline -- Summary -- 5. Cyber Applications -- Application in Practice -- Deciphering the Data -- Evaluating the First Four Hypotheses -- Summary 6. Case Study Analysis -- Deciphering Events through Narrative Linkages -- Japanese Government Case: Economic Espionage -- Ukrainian Power Grid Case: Economic Cyberattack -- Codan Case: Intellectual Property Theft -- Evaluating the Economic Hypotheses (H5, H6, H7, H8) -- Summary -- 7. Framing Future Channels -- Linking Hypotheses to the Research Question -- Future Applications -- Final Thoughts -- Appendix: Cyber Events As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enable actors to change actual economic outcomes without the massive resource investment required for military force deployments. Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values. Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes. -- Provided by publisher. Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberterrorism Political aspects. Balance of power Economic aspects. Cyberguerre (Science militaire) Cyberterrorisme Aspect politique. Équilibre des puissances Aspect économique. SOCIAL SCIENCE Criminology. bisacsh BUSINESS & ECONOMICS International Economics. bisacsh Cyberspace operations (Military science) fast has work: Cashing in on cyberpower (Text) https://id.oclc.org/worldcat/entity/E39PCG9FcyhMrDrPmDYxfRCG73 https://id.oclc.org/worldcat/ontology/hasWork Print version: Peters, Mark T., II. Cashing in on cyberpower. Lincoln : University of Nebraska Press, [2018] 9781640120136 (DLC) 2017052149 (OCoLC)1012715659 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1737410 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1737410 Volltext |
spellingShingle | Peters, Mark T., II Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / 1. Entering the Cyber Commons -- Problem -- Research Question -- Interdependence and Power -- Method Development -- Cyber Application and Case Studies -- Summary -- 2. Interdependence -- Why Use Interdependence Theory? -- Interdependent Characteristics of the Virtual State -- Defining Interdependent Cyberspace -- Cyber Operations -- Summary -- 3. Power -- Types of Power -- Power Application -- Power through Economic Cyber Influences -- Summary -- 4. Method Development -- Method Types -- Describing the Data Sources -- Categorizing Cyber Events -- Case Study Guideline -- Summary -- 5. Cyber Applications -- Application in Practice -- Deciphering the Data -- Evaluating the First Four Hypotheses -- Summary 6. Case Study Analysis -- Deciphering Events through Narrative Linkages -- Japanese Government Case: Economic Espionage -- Ukrainian Power Grid Case: Economic Cyberattack -- Codan Case: Intellectual Property Theft -- Evaluating the Economic Hypotheses (H5, H6, H7, H8) -- Summary -- 7. Framing Future Channels -- Linking Hypotheses to the Research Question -- Future Applications -- Final Thoughts -- Appendix: Cyber Events Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberterrorism Political aspects. Balance of power Economic aspects. Cyberguerre (Science militaire) Cyberterrorisme Aspect politique. Équilibre des puissances Aspect économique. SOCIAL SCIENCE Criminology. bisacsh BUSINESS & ECONOMICS International Economics. bisacsh Cyberspace operations (Military science) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013000988 |
title | Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / |
title_auth | Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / |
title_exact_search | Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / |
title_full | Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / Mark T. Peters II. |
title_fullStr | Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / Mark T. Peters II. |
title_full_unstemmed | Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world / Mark T. Peters II. |
title_short | Cashing in on cyberpower : |
title_sort | cashing in on cyberpower how interdependent actors seek economic outcomes in a digital world |
title_sub | how interdependent actors seek economic outcomes in a digital world / |
topic | Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberterrorism Political aspects. Balance of power Economic aspects. Cyberguerre (Science militaire) Cyberterrorisme Aspect politique. Équilibre des puissances Aspect économique. SOCIAL SCIENCE Criminology. bisacsh BUSINESS & ECONOMICS International Economics. bisacsh Cyberspace operations (Military science) fast |
topic_facet | Cyberspace operations (Military science) Cyberterrorism Political aspects. Balance of power Economic aspects. Cyberguerre (Science militaire) Cyberterrorisme Aspect politique. Équilibre des puissances Aspect économique. SOCIAL SCIENCE Criminology. BUSINESS & ECONOMICS International Economics. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1737410 |
work_keys_str_mv | AT petersmarkt cashinginoncyberpowerhowinterdependentactorsseekeconomicoutcomesinadigitalworld |