Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
39973 Ergebnisse
Sortierung:
SSRN
Working paper
View the Executive SummaryMilitary cyberspace operations have evolved significantly over the past 2 decades and are now emerging into the realm of military operations in the traditional domains of land, sea, and air. The goal of this monograph is to provide senior policymakers, decisionmakers, military leaders, and their respective staffs with a better understanding of Army cyberspace operations within the context of overall U.S. military cyberspace operations. It examines the development of such operations in three major sections. First, it looks at the evolution of Department of Defense cyberspace operations over the past decade to include the founding of U.S. Cyber Command from its roots in various military units focused on defensive and offensive cyberspace operations. Second, it examines the evolution of the Army implementation of cyberspace operations toward the initial establishment of Army Cyber Command as well as recent efforts to establish Fort Gordon, Georgia as the center of gravity for Army cyberspace activities. Third, it explores the role of cyberspace operations in the escalation of international conflict, focusing on the sufficiency of the current cyberspace force structure to address an international environment of multiple actors interacting with varying degrees of tension. ; https://press.armywarcollege.edu/monographs/1470/thumbnail.jpg
BASE
"This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The 2nd edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations and operational practice associated with computer network attack, computer network exploitation, and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors. Specifically, the book provides a comprehensive overview of several key issue areas: - The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense; - An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of international relations (IR), security studies, psychology and Science, Technology and Society (STS) studies; - Current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; - An examination of key challenges in international law, norm development and deterrence; and - The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict. This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and International Relations in general"--
Over the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph examines the relationships among these domains and how they apply to U.S. Army and joint warfighting. It concentrates on the central question: How are U.S. military operations in the newest domains of space and cyberspace being integrated with operations in the traditional domain of land? This inquiry is divided into three major sections: • Existing Doctrine: This section presents an overview of the current state of joint and U.S. Army doctrinal development for each of the domains of land, space, and cyberspace. • Operations in Multiple Domains: This section examines the concept of cross-domain synergy and its ability to enhance globally integrated operations. • Future Operations: This section explores probable future operating environments as well as the resulting implications for U.S. Army and joint force development. It includes recommendations for policymakers and senior leaders regarding the future development and integration of space and cyberspace doctrine. Anticipated future trends favor the decreased emphasis on traditional large-scale land operations and increased frequency and intensity of conflict in space and cyberspace, perhaps even where these newer domains may become preeminent for a given operation. The joint staff's pursuit of achieving cross-domain synergy in planning and operations offers a credible method to face some of the challenges of the future joint force, but this will likely remain an evolutionary vice revolutionary endeavor. ; https://press.armywarcollege.edu/monographs/1399/thumbnail.jpg
BASE
In: Orbis: FPRI's journal of world affairs, Band 62, Heft 2, S. 262-277
ISSN: 0030-4387
World Affairs Online
In: Orbis: FPRI's journal of world affairs, Band 62, Heft 2, S. 262-277
ISSN: 0030-4387
In: Emerging technologies, ethics and international affairs
This edited volume explores a wide array of ethical issues surrounding the advent of cyberwarfare. The moral complexities presented by cyberwar are many and they challenge our traditional understandings of just war theory and the ethics of war. This volume directly addresses the pressing need for serious scholarly analysis of this new form of warfare.
The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application
In: Teme: časopis za društvene nauke : journal for social sciences, S. 1359
ISSN: 1820-7804
Contemporary global security environment could be labeled as complex, dynamic, multidimensional and ''beyond limits'' of conventional understanding of Warfare. Diversity of threat forms and its interactions and non-conventionality contribute that most of the actual security crises and conflicts are marked as Hybrid security endangering, or Hybrid Warfare. Globalised tehnology introduce new ''battlefild'' in global digital arena. Massive application of information and communication technology has brought about new risks and threats represented by physical and software related dangers to critical information infrastructure and cyberspace that are of relevance to the nation and its security. In same hand, wolnurability and inportance of Cyber space tends to provoke necessity for ultimate resilaince copabilities against ataks and informational warfare. Hybrid form and asimetrical nature of endangerment of Cyber space which is crutial for national defence copabilites, rised analiticial approach to the political, security and organizational forms as well as clasification of threats in cyber space which were elaborated in this paper. Authors' contribute to the understunding of threats in Cyber secyrity arena, trough analyses of China PLA approach to the subject. In addition, unique contribution is given with analyses of Cyber-Information Warfare during 1999 NATO aggression to the Federal Republic of Yugoslavia.
In: The military balance: the annual assessment of global military capabilities and defence economics, S. 27-32
ISSN: 0459-7222
In recent years, much comment and analysis has been devoted to questions surrounding the potential or actual military uses of cyberspace. Cyberspace can be used for a range of tasks, including gathering information, infiltrating and exploiting networked systems of potential or actual adversaries, and delivering effects that may have implications for military forces, either in terms of impact on them or in terms of tasks that they may be called on to undertake in response. This article assesses national and multinational cyber capabilities, both civil and military, even if these are difficult to detail in the traditionally quantitative way to address military inventories. Adapted from the source document.
In: Polish political science yearbook, Band 51, S. 1-14
The dynamic civilisation transformations observed worldwide in recent years have arisen from the rapid development of information and the ICTs that support it. Cyberspace is a new sphere affected by these processes, and it evolves alongside the threats occurring therein. Nowadays, no country's cyberspace is entirely secure. Cyber threats are characterised by unpredictability and global reach. In modern times, cyberspace is a symbol of development, the freedom of speech, and the right to privacy and every interference in the behaviours of its users is associated with an attack on these values. The article discusses the fundamental problems concerning operations in cyberspace justified by the violation of human rights but should also be assessed in the context of interference with the scope of individual rights and freedoms, including in times of seemingly normal functioning, namely in times of peace.