Cyber strategy : the evolving character of power and coercion /

Saved in:
Bibliographic Details
Author / Creator:Valeriano, Brandon, author.
Imprint:New York, NY : Oxford University Press, [2018]
©2018
Description:xii, 305 pages : illustrations ; 25 cm
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11695732
Hidden Bibliographic Details
Other authors / contributors:Jensen, Benjamin M., author.
Maness, Ryan C., author.
ISBN:9780190618094
0190618094
Notes:Includes bibliographical references (pages 257-290) and index.
Summary:"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--
Other form:Online version: Valeriano, Brandon. Cyber coercion. New York, NY : Oxford University Press, [2018] 9780190618100

MARC

LEADER 00000cam a2200000 i 4500
001 11695732
003 ICU
005 20181119015250.0
008 180328t20182018nyua b 001 0 eng c
010 |a  2017057806 
040 |a LBSOR/DLC  |b eng  |e rda  |c DLC  |d OCLCF  |d OCLCO  |d OCLCQ  |d XII  |d YDX  |d BDX  |d CDX  |d QGJ  |d RCJ  |d CHVBK  |d OCLCO  |d UKMGB  |d OCLCA 
015 |a GBB8B2162  |2 bnb 
016 7 |a 018914763  |2 Uk 
019 |a 1024139806 
020 |a 9780190618094  |q (hardcover ;  |q alkaline paper) 
020 |a 0190618094  |q (hardcover ;  |q alkaline paper) 
035 |a (OCoLC)1035249779  |z (OCoLC)1024139806 
042 |a pcc 
050 0 0 |a HV6773.15.C97  |b V35 2018 
082 0 0 |a 327.120285/4678  |2 23 
049 |a CGUA 
100 1 |a Valeriano, Brandon,  |e author.  |0 http://id.loc.gov/authorities/names/no2004042698  |1 http://viaf.org/viaf/56321844 
245 1 0 |a Cyber strategy :  |b the evolving character of power and coercion /  |c Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness. 
264 1 |a New York, NY :  |b Oxford University Press,  |c [2018] 
264 4 |c ©2018 
300 |a xii, 305 pages :  |b illustrations ;  |c 25 cm 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
520 |a "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--  |c Provided by publisher. 
504 |a Includes bibliographical references (pages 257-290) and index. 
505 0 |a How rival states employ cyber strategy : disruption, espionage, and degradation -- The correlates of cyber strategy -- Cyber coercion as a combined strategy -- Commissars and crooks : Russian cyber coercion -- China and the technology gap : Chinese strategic behavior in cyberspace -- The United States : the cyber reconnaissance-strike complex. 
650 0 |a Cyberterrorism.  |0 http://id.loc.gov/authorities/subjects/sh00001974 
650 0 |a Information warfare  |v Case studies. 
650 0 |a Cyberspace operations (Military science)  |0 http://id.loc.gov/authorities/subjects/sh2013000988 
650 7 |a Cyberspace operations (Military science)  |2 fast  |0 (OCoLC)fst01909446 
650 7 |a Cyberterrorism.  |2 fast  |0 (OCoLC)fst00885802 
650 7 |a Information warfare.  |2 fast  |0 (OCoLC)fst00973186 
650 7 |a Computersicherheit  |2 gnd  |0 (DE-588)4274324-2 
650 7 |a Cyberterrorismus  |2 gnd  |0 (DE-588)1118882725 
650 7 |a Information warfare  |2 gnd  |0 (DE-588)4461975-3 
650 7 |a Internetkriminalität  |2 gnd  |0 (DE-588)7864395-8 
650 7 |a Regierung  |2 gnd  |0 (DE-588)4049012-9 
650 7 |a Sicherheitspolitik  |2 gnd  |0 (DE-588)4116489-1 
650 7 |a Strategie  |2 gnd  |0 (DE-588)4057952-9 
651 7 |a China  |2 gnd  |0 (DE-588)4009937-4 
651 7 |a Russland  |2 gnd  |0 (DE-588)4076899-5 
651 7 |a USA  |2 gnd  |0 (DE-588)4078704-7 
655 7 |a Case studies.  |2 fast  |0 (OCoLC)fst01423765 
700 1 |a Jensen, Benjamin M.,  |e author.  |0 http://id.loc.gov/authorities/names/no2015059133  |1 http://viaf.org/viaf/315610426 
700 1 |a Maness, Ryan C.,  |e author.  |0 http://id.loc.gov/authorities/names/n2015003018  |1 http://viaf.org/viaf/279993179 
776 0 8 |i Online version:  |a Valeriano, Brandon.  |t Cyber coercion.  |d New York, NY : Oxford University Press, [2018]  |z 9780190618100  |w (DLC) 2018021764 
903 |a HeVa 
929 |a cat 
999 f f |i 24cc35e7-c39f-5c8d-86f5-ba354a7e7456  |s e35cd4b6-224b-5a97-a0cf-1fac850a130d 
928 |t Library of Congress classification  |a HV6773.15.C97 V35 2018  |l JRL  |c JRL-Gen  |i 11134777 
927 |t Library of Congress classification  |a HV6773.15.C97 V35 2018  |l JRL  |c JRL-Gen  |e WAGN  |b 115711015  |i 10012716