Suchergebnisse
Filter
26 Ergebnisse
Sortierung:
World Affairs Online
The challenges of military adaptation to the cyber domain: a case study of the Netherlands
In: Small wars & insurgencies, Band 34, Heft 7, S. 1343-1362
ISSN: 1743-9558
A US history of not conducting cyber attacks
In: Bulletin of the atomic scientists, Band 78, Heft 4, S. 208-213
ISSN: 1938-3282
Cyber Arms Transfer: Meaning, Limits, and Implications
In: Security studies, Band 31, Heft 1, S. 65-91
ISSN: 1556-1852
Cyber Arms Transfer: Meaning, Limits and Implications
In: Security Studies, Forthcoming
SSRN
U.S. cyber strategy of persistent engagement & defend forward: implications for the alliance and intelligence collection
In: Intelligence and national security, Band 35, Heft 3, S. 444-453
ISSN: 1743-9019
Integrating offensive cyber capabilities: meaning, dilemmas, and assessment
In: Defence studies, Band 18, Heft 4, S. 395-410
ISSN: 1743-9698
A matter of time: On the transitory nature of cyberweapons
In: The journal of strategic studies, Band 41, Heft 1-2, S. 6-32
ISSN: 1743-937X
A Matter of Time: On the Transitory Nature of Cyber Weapons
SSRN
Working paper
Deter, disrupt, or deceive: assessing cyber conflict as an intelligence contest
"The idea of "cyber war" has played a dominant role both in academic and popular discourses concerning the nature of statecraft and conflict in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for advantage below the threshold of war? This book debates that question. The contributors unpack the conceptual and theoretical logics of the framing of cyber competition as an intelligence contest, particularly in the areas of information theft and manipulation. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts, and placing all of it in conversation with the larger fields of international relations and intelligence studies"--
The Dutch Cybersecurity Landscape: From Cyber 'Air Castles' to Concrete Building Blocks
In: Scott N. Romaniuk, Mary Manjikian, Routledge Companion to Global Cyber-Security Strategy, Forthcoming
SSRN
Working paper
Determinants of Cyber Readiness
SSRN
Working paper
What Do We Talk About When We Talk About 'Cyber'?
SSRN
Working paper
Regulatory cybersecurity governance in the making: the formation of ENISA and its struggle for epistemic authority
In: Journal of European public policy, Band 30, Heft 7, S. 1330-1352
ISSN: 1466-4429
Publicly attributing cyber attacks: a framework
In: The journal of strategic studies, Band 46, Heft 3, S. 502-533
ISSN: 1743-937X