The main question of this research is, what are the conditions that make cyber-deterrence successful? To answer such a question, this thesis rests on the assumption that deterrence in cyberspace is feasible despite certain issues present in this domain. The main tasks in this thesis were: • Define, how deterrence strategy works and what are its‘ essential features. • After conducting a case study answer the question, how was cyber-deterrence applied in the United States from 2009 up to 2018 and how the strategy evolved? • Define, what features are required for cyber-deterrence to work, and make suggestion on how to improve the implementation of said features. The case study method was used for the analysis and the case that was chosen was U...
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. ...
When compared to advancements in conceptualising deterrence in other domains, cyber deterrence is st...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
With the increasing frequency of cyberattacks, there has been growing discussion on whether these ac...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
The popularity of the deterrence perspective across multiple scientific disciplines has sparked a li...
Nuclear deterrence based on mutual assured destruction seems to have successfully prevented a global...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
Theoretical thesis.Bibliography: pages 72-78.Chapter 1. Introduction -- Chapter 2. Brief overview --...
Developed in recent decades, the understanding of cyberspace as an environment in which a state can ...
Linking deterrence theory to cybersecurity policy and critical-infrastructure protection is easier s...
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses o...
The prefix cyber has become a major buzzword in the 21st century and nation states are now concerned...
In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limit...
When compared to advancements in conceptualising deterrence in other domains, cyber deterrence is st...
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. ...
When compared to advancements in conceptualising deterrence in other domains, cyber deterrence is st...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
With the increasing frequency of cyberattacks, there has been growing discussion on whether these ac...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
The popularity of the deterrence perspective across multiple scientific disciplines has sparked a li...
Nuclear deterrence based on mutual assured destruction seems to have successfully prevented a global...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
Theoretical thesis.Bibliography: pages 72-78.Chapter 1. Introduction -- Chapter 2. Brief overview --...
Developed in recent decades, the understanding of cyberspace as an environment in which a state can ...
Linking deterrence theory to cybersecurity policy and critical-infrastructure protection is easier s...
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses o...
The prefix cyber has become a major buzzword in the 21st century and nation states are now concerned...
In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limit...
When compared to advancements in conceptualising deterrence in other domains, cyber deterrence is st...
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. ...
When compared to advancements in conceptualising deterrence in other domains, cyber deterrence is st...
The United States is heavily reliant on information technology and cyberspace to function at the soc...