Cyber conflict between states is a growing trend. There is a large body of research on cyber conflict, but there is very little quantitative analysis to support the theories or to assist in predicting future use of cyber operations. Using a logistic regression analysis, this thesis studies cyber conflicts between dyadic rivals from 2001 to 2011 to answer under what conditions cyber incidents occur between dyadic rivals in the past in the hopes to better analyze and predict future cyber incidents. The data demonstrate that the geographic proximity between dyads increases the probability of a cyber incident occurring while any or both of the dyads holds membership in NATO causes a decrease in the probability that cyber operations occur betwee...
This dissertation is comprised of three separate papers that address how cyber power contributes to ...
In today’s interconnected society, high profile examples of online victimization abound. Cyber-bull...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...
The increased use of cyber warfare, accomplished by both state and non-state actors, raises question...
As technology continues to advance the domain of cyber defense, signature and heuristic detection me...
This dissertation is a mixed method, empirical study on the causes and consequences of the prolifera...
Doctor of PhilosophySecurity StudiesJeffrey J. PickeringAs the Internet is progressively integrated ...
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future secur...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
Through case studies and empirical statistical research, this thesis tests the theory that informati...
The conceptions of warfare and battlefield have astonishingly evolved, going from a traditional view...
80 pagesThis research project studies how three linguistic shifts, experiencer deletion; deleted age...
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
In recent years, scholars, commentators and politicians have discussed the prospect of a ‘cyber secu...
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ ha...
This dissertation is comprised of three separate papers that address how cyber power contributes to ...
In today’s interconnected society, high profile examples of online victimization abound. Cyber-bull...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...
The increased use of cyber warfare, accomplished by both state and non-state actors, raises question...
As technology continues to advance the domain of cyber defense, signature and heuristic detection me...
This dissertation is a mixed method, empirical study on the causes and consequences of the prolifera...
Doctor of PhilosophySecurity StudiesJeffrey J. PickeringAs the Internet is progressively integrated ...
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future secur...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
Through case studies and empirical statistical research, this thesis tests the theory that informati...
The conceptions of warfare and battlefield have astonishingly evolved, going from a traditional view...
80 pagesThis research project studies how three linguistic shifts, experiencer deletion; deleted age...
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
In recent years, scholars, commentators and politicians have discussed the prospect of a ‘cyber secu...
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ ha...
This dissertation is comprised of three separate papers that address how cyber power contributes to ...
In today’s interconnected society, high profile examples of online victimization abound. Cyber-bull...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...