This essay explores the challenges of ensuring cyber security internationally and what needs to be done for Western-aligned states to address cyber weapons internationally. At present, the prevailing approach by the major powers in cyber space is antagonistic and destabilizing. To address this situation and ensure international peace is maintained, a comprehensive approach is needed. This approach should draw upon the lessons learned during the early years of the Cold War. During this time, international norms concerning nuclear weapons were in their nascent stage and the international system was only just beginning to settle into a bi-polar structure. Today, by drawing an analogy between nuclear weapons and cyber weapons and utilizing the ...
Public policy discourse about cyber security in the United States is dominated by a metaphor of war ...
The opportunities provided by the information and communications technology, with a special emphasis...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
After world -War II, the influence of the computer went beyond military realm by extending to other ...
For over a decade, we have heard alarming statements about the spread of cyber weapons from senior p...
Abstract- Information Technology (IT) security is a growing concern for governments around the world...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
Over the past two decades, the ubiquitousness of the internet has created new reals in which artisti...
Despite being a crucially important domain for states, businesses, and individuals, cyberspace still...
The opportunities provided by the information and communications technology, with a special emphasis...
Public policy discourse about cyber security in the United States is dominated by a metaphor of war ...
The opportunities provided by the information and communications technology, with a special emphasis...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
After world -War II, the influence of the computer went beyond military realm by extending to other ...
For over a decade, we have heard alarming statements about the spread of cyber weapons from senior p...
Abstract- Information Technology (IT) security is a growing concern for governments around the world...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
Over the past two decades, the ubiquitousness of the internet has created new reals in which artisti...
Despite being a crucially important domain for states, businesses, and individuals, cyberspace still...
The opportunities provided by the information and communications technology, with a special emphasis...
Public policy discourse about cyber security in the United States is dominated by a metaphor of war ...
The opportunities provided by the information and communications technology, with a special emphasis...
This paper examines the causal relationship between cyber technology’s deep global integration and c...