There are frequent reports of cyber intrusions in everyday media. Attacks in the cyber domain have become commonplace and even USA with the world’s largest military falls short in deterring all hostile actors from conducting actions such as espionage and theft in the cyber domain. Considering the hardship of a superpower like the USA of deterring hostile action in the cyber domain, the question arose of how a small state such as Sweden aspire to solve this problem. The aim of this thesis was to describe Swedish strategy by using an analytical framework based upon N.J. Ryan’s theory of successful cyber deterrence. The results show that only deterrence by association can be clearly identified within current Swedish strategy. The current actio...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...
The purpose of this thesis is to study the way the European Union and Sweden respectively frame the ...
This study applies a post-structural discourse analysis developed by Carol Bacchi, called the WPR-ap...
There are frequent reports of cyber intrusions in everyday media. Attacks in the cyber domain have b...
The theory of deterrence has not changed much over time but the strategy of using it has. There are ...
The technology of the 21st century has brought immense benefits to humanity. For example, we can com...
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. ...
In accordance with the EU Network and Information Security directive (NIS directive), the Swedish go...
The Cyber-domain is normally viewed as an individual warfighting domain without much interaction wit...
This thesis examines the Swedish Government Cyber Security Strategy laid out for the years 2016-2022...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
According to Sweden’s military strategic doctrine, Swedish defense capabilities should be deterrent ...
The following thesis intends to study how cyber security and cyber threats are portrayed in Swedish ...
This study investigates the contemporary Swedish deterrence strategy through a qualitative text anal...
This dissertation consists of three parts and has a twofold research interest. The research interest...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...
The purpose of this thesis is to study the way the European Union and Sweden respectively frame the ...
This study applies a post-structural discourse analysis developed by Carol Bacchi, called the WPR-ap...
There are frequent reports of cyber intrusions in everyday media. Attacks in the cyber domain have b...
The theory of deterrence has not changed much over time but the strategy of using it has. There are ...
The technology of the 21st century has brought immense benefits to humanity. For example, we can com...
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. ...
In accordance with the EU Network and Information Security directive (NIS directive), the Swedish go...
The Cyber-domain is normally viewed as an individual warfighting domain without much interaction wit...
This thesis examines the Swedish Government Cyber Security Strategy laid out for the years 2016-2022...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
According to Sweden’s military strategic doctrine, Swedish defense capabilities should be deterrent ...
The following thesis intends to study how cyber security and cyber threats are portrayed in Swedish ...
This study investigates the contemporary Swedish deterrence strategy through a qualitative text anal...
This dissertation consists of three parts and has a twofold research interest. The research interest...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...
The purpose of this thesis is to study the way the European Union and Sweden respectively frame the ...
This study applies a post-structural discourse analysis developed by Carol Bacchi, called the WPR-ap...