In the digital age, contemporary international security has dramatically changed and continues to rapidly evolve. These new security dynamics after the Cold War have caused a marked change in global power structures. Modern information and communication technologies have emboldened non-state actors (corporations, groups and individuals) with the ability to project strategic global power like never before. The power shifts have caused certain states to vow to assert physical force in response to the perceived threat. The polarising nature of this potential solution has stimulated international debate. Therefore, this article proposes a possible solution that should be further developed. The main argument is that to reduce the threat from cyb...
Next to sea, land, air and space, cyberspace appears to be the fifth operational domain for the mili...
This brief article argues for a narrow definition of cyberwar and a technology-centric approach to u...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
This documented briefing continues the elaboration of our ideas about how the information revolutio...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
With two years having passed since the infamous cyber conflict between Estonia and Russia, on 08 May...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
The president of Estonia, Kersti Kaljulaid, has supported the use of collective countermeasures in r...
Abstract- Information Technology (IT) security is a growing concern for governments around the world...
Next to sea, land, air and space, cyberspace appears to be the fifth operational domain for the mili...
This brief article argues for a narrow definition of cyberwar and a technology-centric approach to u...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
This documented briefing continues the elaboration of our ideas about how the information revolutio...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
With two years having passed since the infamous cyber conflict between Estonia and Russia, on 08 May...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
The president of Estonia, Kersti Kaljulaid, has supported the use of collective countermeasures in r...
Abstract- Information Technology (IT) security is a growing concern for governments around the world...
Next to sea, land, air and space, cyberspace appears to be the fifth operational domain for the mili...
This brief article argues for a narrow definition of cyberwar and a technology-centric approach to u...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...