placeholder

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    2015
    ISBN: 978-0-19-020479-2  ISBN: 0-19-020479-6 
    Title: Cyber war versus cyber realities
    Subtitle: cyber conflict in the international system
    Publisher(s): Oxford [u.a.] : Oxford Univ. Press
    Document type: Book
    Physical description: XIV, 268 S. Ill., graph. Darst., Kt.
    ISBN: 978-0-19-020479-2 , 0-19-020479-6
    Footnote: Machine generated contents note: -- Preface -- Acknowledgements -- Chapter 1: The Contours of the Cyber Conflict World -- Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations -- Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists -- Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus -- Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations -- Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear -- Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- Chapter 9: Conclusion -- Tables and Figures
    Classification (RVK):
    Abstract: "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--"What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue ++that restraint is the norm in cyberspace and suggest
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    2015
    ISBN: 978-0-7456-9084-1  ISBN: 978-0-7456-9085-8 
    Person(s): Lyon, David
    Title: Surveillance after Snowden
    Publisher(s): Cambridge [u.a.] : Polity Press
    Document type: Book
    Physical description: XII, 183 S. Kt.
    ISBN: 978-0-7456-9084-1 , 978-0-7456-9085-8
    Classification (DDC): Grundrechte und politische Rechte
    Classification (RVK):
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    1. Aufl. 1935
    Title: Der Raum als Waffe
    Subtitle: Versuch einer raumpolitischen Strategie
    Edition: 1. Aufl.
    Publisher(s): Berlin : Runge
    Document type: Book
    Physical description: 159 S. graph. Darst.
    Footnote: In Fraktur
    Classification (RVK):
    Classification (RVK):
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...