With the U.S. government acknowledgement of the seriousness of cyber threats, particularly against its critical infrastructures, as well as the Department of Defense officially labeling cyberspace as a war fighting domain, the Cold War strategy of deterrence is being applied to the cyber domain. However, unlike the nuclear realm, cyber deterrence must incorporate a wide spectrum of potential adversaries of various skill, determination, and capability, ranging from individual actors to state run enterprises. What’s more, the very principles that achieved success in deterring the launch of nuclear weapons during the Cold War, namely the threat of severe retaliation, cannot be achieved in cyberspace, thus neutralizing the potential effectivene...
Nuclear deterrence based on mutual assured destruction seems to have successfully prevented a global...
Developed in recent decades, the understanding of cyberspace as an environment in which a state can ...
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-att...
With the U.S. government acknowledgement of the seriousness of cyber threats, particularly against i...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses o...
Theories of cyber deterrence are developing rapidly. However, the literature is missing an important...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
\u201cCyber as Deterrent\u201d authored by Maurizio Martellini and Sandro Gaycken, is a state-of-the...
The prefix cyber has become a major buzzword in the 21st century and nation states are now concerned...
Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a ...
This brief article argues for a narrow definition of cyberwar and a technology-centric approach to u...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
Linking deterrence theory to cybersecurity policy and critical-infrastructure protection is easier s...
Nuclear deterrence based on mutual assured destruction seems to have successfully prevented a global...
Developed in recent decades, the understanding of cyberspace as an environment in which a state can ...
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-att...
With the U.S. government acknowledgement of the seriousness of cyber threats, particularly against i...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses o...
Theories of cyber deterrence are developing rapidly. However, the literature is missing an important...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
\u201cCyber as Deterrent\u201d authored by Maurizio Martellini and Sandro Gaycken, is a state-of-the...
The prefix cyber has become a major buzzword in the 21st century and nation states are now concerned...
Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a ...
This brief article argues for a narrow definition of cyberwar and a technology-centric approach to u...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
Linking deterrence theory to cybersecurity policy and critical-infrastructure protection is easier s...
Nuclear deterrence based on mutual assured destruction seems to have successfully prevented a global...
Developed in recent decades, the understanding of cyberspace as an environment in which a state can ...
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-att...