<span>A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace.</span><span><br><br>Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In</span><span> Cyber Persistence Theory</span><span>, Michael P. Fischerkel
Cyber Persistence Theory: Redefining National Security in Cyberspace
โ Scribed by Michael P. Fischerkeller; Emily O. Goldman; Richard J. Harknett
- Publisher
- Oxford University Press
- Year
- 2022
- Tongue
- English
- Leaves
- 273
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.
๐ SIMILAR VOLUMES
<span>A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace.</span><span><br><br>Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In</span><span> Cyber Persistence Theory</span><span>, Michael P. Fischerkel
<p>This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from p
<p>This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from p
<p>This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from p
<P>Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-part