ORPP logo
Image from Google Jackets

Cyber Strategy : The Evolving Character of Power and Coercion.

By: Contributor(s): Material type: TextTextPublisher: Oxford : Oxford University Press, Incorporated, 2018Copyright date: ©2018Edition: 1st edDescription: 1 online resource (321 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780190618100
Subject(s): Genre/Form: Additional physical formats: Print version:: Cyber StrategyDDC classification:
  • 327.120285/4678
LOC classification:
  • HV6773.15.C97 .V354 2018
Online resources:
Contents:
Cover -- Half title -- Cyber Strategy -- Copyright -- Contents -- Preface -- Acknowledgments -- 1. Introduction: Are Cyber Strategies Coercive? -- 2. How Rival States Employ Cyber Strategy: Disruption, Espionage, and Degradation -- 3. The Correlates of Cyber Strategy -- 4. Cyber Coercion as a Combined Strategy -- 5. Commissars and Crooks: Russian Cyber Coercion -- 6. China and the Technology Gap: Chinese Strategic Behavior in Cyberspace -- 7. The United States: The Cyber Reconnaissance-​Strike Complex -- 8. Conclusion: Cyber Political Warfare with Limited Effects -- Appendix 1: The Dyadic Cyber Incident and Dispute Dataset Version 1.1 -- Appendix 2: Cyber Strategy Policy Summary -- Appendix 3: The Dyadic Cyber Incident and Dispute Dataset (DCID), Version 1.1, Summarized Version -- Notes -- References -- Index.
Summary: Are cyber operations as revolutionary as the headlines suggest? Do they compel rival states and alter international politics? By examining cyber strategy as a contemporary form of political warfare and covert action, this book demonstrates that the digital domain complements rather than replaces traditional instruments of power.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Half title -- Cyber Strategy -- Copyright -- Contents -- Preface -- Acknowledgments -- 1. Introduction: Are Cyber Strategies Coercive? -- 2. How Rival States Employ Cyber Strategy: Disruption, Espionage, and Degradation -- 3. The Correlates of Cyber Strategy -- 4. Cyber Coercion as a Combined Strategy -- 5. Commissars and Crooks: Russian Cyber Coercion -- 6. China and the Technology Gap: Chinese Strategic Behavior in Cyberspace -- 7. The United States: The Cyber Reconnaissance-​Strike Complex -- 8. Conclusion: Cyber Political Warfare with Limited Effects -- Appendix 1: The Dyadic Cyber Incident and Dispute Dataset Version 1.1 -- Appendix 2: Cyber Strategy Policy Summary -- Appendix 3: The Dyadic Cyber Incident and Dispute Dataset (DCID), Version 1.1, Summarized Version -- Notes -- References -- Index.

Are cyber operations as revolutionary as the headlines suggest? Do they compel rival states and alter international politics? By examining cyber strategy as a contemporary form of political warfare and covert action, this book demonstrates that the digital domain complements rather than replaces traditional instruments of power.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.