The Decision to Attack: Military and Intelligence Cyber Decision-Making
โ Scribed by Aaron Franklin Brantly, William Keller, Scott Jones
- Publisher
- Studies in Security and Intern
- Year
- 2016
- Tongue
- English
- Leaves
- 245
- Series
- Studies in Security and International Affairs
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level. Topics Discussed: The Key Concepts of Cyber The Motivation and Utility for Covert Action Digital Power Anonymity and Attribution in Cyberspace Cyber and Conventional Operations: The Dynamics of Conflict Defining the Role of Intelligence in Cyberspace How actors decide to use cyber-a rational choice approach Cognitive Processes and Decision-Making in Cyberspace Finding meaning in the expected utility of international cyber conflict
๐ SIMILAR VOLUMES
University of Georgia Press, 2016. โ 240 p. โ ISBN-10: 0820349208. โ ISBN-13: 978-0820349206. โ Studies in Security and International Affairs Ser<div class="bb-sep"></div>Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how ratio
University of Georgia Press, 2016. โ 218 p. โ ISBN-10: 0820349208. โ ISBN-13: 978-0820349206. โ Studies in Security and International Affairs Ser<div class="bb-sep"></div>Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how ratio
<p>Risks are an integral part of complex, high-stakes decisions, and decisionmakers are faced with the unavoidable tasks of assessing risks and forming risk preferences. This is true for all decision domains, including financial, environmental, and foreign policy domains, among others. How well deci
Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize o