In this chapter, the authors discuss the phenomenon of interstate conflicts in cyber space. In the last twenty years, this issue has become more explicit, and countries are making increasingly frequent mutual cyber warfare and cyber espionage accusations. The political and military elite of conflicting countries perceive the situation as very serious and are preparing not only for defending their segment of cyber space, but for developing offensive strategies for cyber warfare, as well. The authors endeavor to contribute to peace research by examining the possibilities for achieving cyber détente, the idea promoted by Henry Kissinger in 2011. In this chapter, the authors identify and analyze problems whose solution should be the focus of th...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
Modern society is critically dependent on information as a strategic resource and information and co...
The Thesis explores the motives and conditions under which the US, China, and Russia are likely to c...
The conceptual debate around the term cyber warfare has dominated the cybersecurity discipline over ...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
After world -War II, the influence of the computer went beyond military realm by extending to other ...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Cyberspace, already a few decades old, has become a matter of course for most of us, part of our eve...
Based on democratic principles that encourage creation and transmission of information and knowledge...
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future secur...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
This brief article argues for a narrow definition of cyberwar and a technology-centric approach to u...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
Modern society is critically dependent on information as a strategic resource and information and co...
The Thesis explores the motives and conditions under which the US, China, and Russia are likely to c...
The conceptual debate around the term cyber warfare has dominated the cybersecurity discipline over ...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
After world -War II, the influence of the computer went beyond military realm by extending to other ...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Cyberspace, already a few decades old, has become a matter of course for most of us, part of our eve...
Based on democratic principles that encourage creation and transmission of information and knowledge...
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future secur...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
This brief article argues for a narrow definition of cyberwar and a technology-centric approach to u...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
Modern society is critically dependent on information as a strategic resource and information and co...