The technology of the 21st century has brought immense benefits to humanity. For example, we can communicate via the internet and have a whole encyclopaedia at our fingertips in our mobile devices. But society has also become more vulnerable to cyberattacks and other aggressive cyberthreats. As shown by the war in Georgia in 2008 and in Estonia in 2007 there are states that now have the power and will to act violently in cyberspace. Sweden has a general strategy for deterring agressors but how is deterrence used in cyberspace and does Sweden actually have a specific cyberdeterrence strategy? Theorists in deterrence have concluded that deterrence in cyberspace differs in various ways from conventional deterrence. One of these theorists, Will...
Sweden is one of the world's most digitized countries but falls behind when it comes to ITand cybers...
With computers, mobile phones and other smart devices being an increasingly part of peoples lives. I...
This study aims to shed light on what a comparison between cybersecurity intelligence and public hea...
The technology of the 21st century has brought immense benefits to humanity. For example, we can com...
There are frequent reports of cyber intrusions in everyday media. Attacks in the cyber domain have b...
The theory of deterrence has not changed much over time but the strategy of using it has. There are ...
In accordance with the EU Network and Information Security directive (NIS directive), the Swedish go...
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. ...
The Cyber-domain is normally viewed as an individual warfighting domain without much interaction wit...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
Chapter 5 analyses the increasing digitalization of Sweden's Society's critical infrastructure and i...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...
This thesis examines the Swedish Government Cyber Security Strategy laid out for the years 2016-2022...
The following thesis intends to study how cyber security and cyber threats are portrayed in Swedish ...
This dissertation consists of three parts and has a twofold research interest. The research interest...
Sweden is one of the world's most digitized countries but falls behind when it comes to ITand cybers...
With computers, mobile phones and other smart devices being an increasingly part of peoples lives. I...
This study aims to shed light on what a comparison between cybersecurity intelligence and public hea...
The technology of the 21st century has brought immense benefits to humanity. For example, we can com...
There are frequent reports of cyber intrusions in everyday media. Attacks in the cyber domain have b...
The theory of deterrence has not changed much over time but the strategy of using it has. There are ...
In accordance with the EU Network and Information Security directive (NIS directive), the Swedish go...
Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. ...
The Cyber-domain is normally viewed as an individual warfighting domain without much interaction wit...
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destr...
Chapter 5 analyses the increasing digitalization of Sweden's Society's critical infrastructure and i...
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of...
This thesis examines the Swedish Government Cyber Security Strategy laid out for the years 2016-2022...
The following thesis intends to study how cyber security and cyber threats are portrayed in Swedish ...
This dissertation consists of three parts and has a twofold research interest. The research interest...
Sweden is one of the world's most digitized countries but falls behind when it comes to ITand cybers...
With computers, mobile phones and other smart devices being an increasingly part of peoples lives. I...
This study aims to shed light on what a comparison between cybersecurity intelligence and public hea...