The aim of this article is to study whether U.S. cyber strategy is integrated into U.S. grand strategy. In consideration of cyber strategy documents, three case studies and elite interviews find that a link between the two strategic layers is largely missing. Even though U.S. cyber strategy documents contain higher political goals, they do not meet other criteria that indicate links to a grand strategy. Those are a unified list of geopolitical challenges, a balance of ends and means, the integration of military, economic and political means, and the provision of a strategic narrative. Thereby, the documents leave the articulation of grand strategy at the initial stages and do not develop it further. The lack of grand strategy in cyberspace ...
Modern society is critically dependent on information as a strategic resource and information and co...
This article seeks to explain both the continuity and the changes in US grand strategy since the end...
The article investigates the political problem of U.S. domination in global cyberspace. The author d...
The aim of this article is to study whether U.S. cyber strategy is integrated into U.S. grand strate...
While much focus has remained on the concept of cyberwar, what we have been observing in actual cybe...
This study identifies and explains variation in how states behave in the new security environment of...
In Chapter 3, James J. Wirtz, Dean of the Naval Postgraduate School in California, describes the glo...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
This article seeks to reconcile the support status of cyber power in the United States military with...
INTERSTATE COOPERATION IN CYBER STRATEGIES OF THE UNITED STATES AND CHINA POST-2010: A COMPARATIVE S...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
The United States relies on networked computing for all manner of economic, social, and civic activi...
Contemporary cyber conflict literature associates state behavior in cyberspace with the underlying t...
Militaristic approaches including U.S. Cyber Command\u27s defend forward and persistent engagemen...
Modern society is critically dependent on information as a strategic resource and information and co...
This article seeks to explain both the continuity and the changes in US grand strategy since the end...
The article investigates the political problem of U.S. domination in global cyberspace. The author d...
The aim of this article is to study whether U.S. cyber strategy is integrated into U.S. grand strate...
While much focus has remained on the concept of cyberwar, what we have been observing in actual cybe...
This study identifies and explains variation in how states behave in the new security environment of...
In Chapter 3, James J. Wirtz, Dean of the Naval Postgraduate School in California, describes the glo...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
This article seeks to reconcile the support status of cyber power in the United States military with...
INTERSTATE COOPERATION IN CYBER STRATEGIES OF THE UNITED STATES AND CHINA POST-2010: A COMPARATIVE S...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
The United States relies on networked computing for all manner of economic, social, and civic activi...
Contemporary cyber conflict literature associates state behavior in cyberspace with the underlying t...
Militaristic approaches including U.S. Cyber Command\u27s defend forward and persistent engagemen...
Modern society is critically dependent on information as a strategic resource and information and co...
This article seeks to explain both the continuity and the changes in US grand strategy since the end...
The article investigates the political problem of U.S. domination in global cyberspace. The author d...