Recent cyber defense studies has shown that there is a qualitative increase in the numbers of cyber-competent actors, as well as an increased technical sophistication of malicious digital tools they are using and the vectors they exploit. These three areas constitute the “who”, “what” and “how” of cyber operations. What is missing from much of these analyses is the “when” question: in which specific geopolitical contexts are cyber operations being deployed. This Trend Analysis examines a series of high-profile cyber incidents with a view to answering this question. In doing so, it identifies five specific geo- and socio-political contexts in which cyber operations play an important role. These are open international conflict, internal civil...
Since the cyber realm has become a prevalent area in society, states have been developing ways to us...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
This article aims to contribute to the operationalisation of military cyber operations in general, a...
Although cyber conflict is no longer considered particularly unusual, significant uncertainties rema...
The development of information technologies in the modern world affects all spheres of human activit...
This study identifies and explains variation in how states behave in the new security environment of...
This study identifies and explains variation in how states behave in the new security environment of...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
This article examines the classification of conflicts consisting of only cyber operations under inte...
This article examines the classification of conflicts consisting of only cyber operations under inte...
It is more than obvious that the way of conducting operations with the time are becoming more sophis...
How have military cyber operations, a diverse set of activities that often differ little from civili...
Objectives: This article explains the concepts of cyber conflict attributes in relation to the class...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
Since the cyber realm has become a prevalent area in society, states have been developing ways to us...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
This article aims to contribute to the operationalisation of military cyber operations in general, a...
Although cyber conflict is no longer considered particularly unusual, significant uncertainties rema...
The development of information technologies in the modern world affects all spheres of human activit...
This study identifies and explains variation in how states behave in the new security environment of...
This study identifies and explains variation in how states behave in the new security environment of...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
This article examines the classification of conflicts consisting of only cyber operations under inte...
This article examines the classification of conflicts consisting of only cyber operations under inte...
It is more than obvious that the way of conducting operations with the time are becoming more sophis...
How have military cyber operations, a diverse set of activities that often differ little from civili...
Objectives: This article explains the concepts of cyber conflict attributes in relation to the class...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
Since the cyber realm has become a prevalent area in society, states have been developing ways to us...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
This article aims to contribute to the operationalisation of military cyber operations in general, a...