Understanding Cyber Conflict

Fourteen Analogies

Nonfiction, Social & Cultural Studies, Political Science, International, International Security, History, Military, Other
Cover of the book Understanding Cyber Conflict by , Georgetown University Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781626164994
Publisher: Georgetown University Press Publication: November 1, 2017
Imprint: Georgetown University Press Language: English
Author:
ISBN: 9781626164994
Publisher: Georgetown University Press
Publication: November 1, 2017
Imprint: Georgetown University Press
Language: English

Cyber weapons and the possibility of cyber conflict—including interference in foreign political campaigns, industrial sabotage, attacks on infrastructure, and combined military campaigns—require policymakers, scholars, and citizens to rethink twenty-first-century warfare. Yet because cyber capabilities are so new and continually developing, there is little agreement about how they will be deployed, how effective they can be, and how they can be managed.

Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first—What Are Cyber Weapons Like?—examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision striking compares with earlier technologies for such missions. The second section—What Might Cyber Wars Be Like?—explores how lessons from several wars since the early nineteenth century, including the World Wars, could apply—or not—to cyber conflict in the twenty-first century. The final section—What Is Preventing and/or Managing Cyber Conflict Like?—offers lessons from past cases of managing threatening actors and technologies.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cyber weapons and the possibility of cyber conflict—including interference in foreign political campaigns, industrial sabotage, attacks on infrastructure, and combined military campaigns—require policymakers, scholars, and citizens to rethink twenty-first-century warfare. Yet because cyber capabilities are so new and continually developing, there is little agreement about how they will be deployed, how effective they can be, and how they can be managed.

Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first—What Are Cyber Weapons Like?—examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision striking compares with earlier technologies for such missions. The second section—What Might Cyber Wars Be Like?—explores how lessons from several wars since the early nineteenth century, including the World Wars, could apply—or not—to cyber conflict in the twenty-first century. The final section—What Is Preventing and/or Managing Cyber Conflict Like?—offers lessons from past cases of managing threatening actors and technologies.

More books from Georgetown University Press

Cover of the book The Engagement of India by
Cover of the book Managing the Fiscal Metropolis by
Cover of the book Reverse Mission by
Cover of the book High-Stakes Reform by
Cover of the book The Quest for Moral Foundations by
Cover of the book Intelligence Elsewhere by
Cover of the book Military Strategy, Joint Operations, and Airpower by
Cover of the book Beyond Machiavelli by
Cover of the book North Korea and Nuclear Weapons by
Cover of the book Practical Decision Making in Health Care Ethics by
Cover of the book To Catch a Spy by
Cover of the book The Future of Ethics by
Cover of the book Spy Chiefs: Volume 1 by
Cover of the book Crossing Boundaries for Intergovernmental Management by
Cover of the book The Sexual Person by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy