Cyber Strategy
Cyber Strategy
The Evolving Character of Power and Coercion
Jensen, Benjamin; Valeriano, Brandon; Maness, Ryan C.
Oxford University Press Inc
06/2020
320
Mole
Inglês
9780197523780
15 a 20 dias
478
Acknowledgements
Chapter 1 - Introduction: Are Cyber Strategies Coercive?
Chapter 2 - How Rival States Employ Cyber Strategy: Disruption, Espionage, and Degradation
Chapter 3 - The Correlates of Cyber Strategy
Chapter 4 - Cyber Coercion as a Combined Strategy
Chapter 5 - Commissars and Crooks: Russian Cyber Coercion
Chapter 6 - China and the Technology Gap: Chinese Strategic Behavior in Cyberspace
Chapter 7 - The United States: The Cyber Reconnaissance-Strike Complex
Chapter 8 - Conclusion: Cyber Political Warfare with Limited Effects
Appendix 1: The Dyadic Cyber Incident and Dispute Dataset Version 1.1
Appendix 2: Cyber Strategy Summary
Appendix 3: The Dyadic Cyber Incident and Dispute Dataset (DCID), version 1.1, summarized version
Notes
Bibliography
Index
Acknowledgements
Chapter 1 - Introduction: Are Cyber Strategies Coercive?
Chapter 2 - How Rival States Employ Cyber Strategy: Disruption, Espionage, and Degradation
Chapter 3 - The Correlates of Cyber Strategy
Chapter 4 - Cyber Coercion as a Combined Strategy
Chapter 5 - Commissars and Crooks: Russian Cyber Coercion
Chapter 6 - China and the Technology Gap: Chinese Strategic Behavior in Cyberspace
Chapter 7 - The United States: The Cyber Reconnaissance-Strike Complex
Chapter 8 - Conclusion: Cyber Political Warfare with Limited Effects
Appendix 1: The Dyadic Cyber Incident and Dispute Dataset Version 1.1
Appendix 2: Cyber Strategy Summary
Appendix 3: The Dyadic Cyber Incident and Dispute Dataset (DCID), version 1.1, summarized version
Notes
Bibliography
Index