Results 31 to 40 of about 5,305 (181)
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. With the aim of responding to and ensuring cyber security effectively, studies on which pathways should be followed and what methods should be used to develop, create, and implement a NCSS are being conducted in Turkey,
Mustafa Senol +2 more
wiley +1 more source
Vorgestellt wird das deutsche Crossmedia-Projekt Netwars – out of CRTL(2014/15), das über ein inter- und transmediales Medienensemble (interaktive Web-Seiten, Dokumentarfilm, Romane und Hörbücher, interaktiver App-Comic) auf die Gefahren von ...
Matthis Kepser
doaj +1 more source
Warfighting for cyber deterrence: a strategic and moral imperative [PDF]
Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War ...
Lonsdale, David J.
core +1 more source
Cyberwar and Mediation Theory [PDF]
Cyberwar (military operations conducted via computer networks) is often downplayed compared to traditional military operations as they are largely invisible to outside observers, difficult to convincingly attribute to a particular source and rarely cause physical damage or obvious harm.
Gertz, Nolen +2 more
openaire +1 more source
Cyberattacks and the Erosion of State Sovereignty [PDF]
This paper will tackle the issue of cyberattacks and the Erosion of State Sovereignty as cyberattacks have become a significant challenge to state sovereignty in the 21st century, threatening traditional concept of territorial control as well as the ...
Ana Maria COSTEA, Mihail CARADAICĂ
doaj +1 more source
Computable Rationality, NUTS, and the Nuclear Leviathan [PDF]
This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it ...
Amadae, S. M.
core +1 more source
The End of Innocence: Rethinking Noncombatancy in the Post-Kosovo Era [PDF]
The protection of civilians and their property in war is an accepted norm of international law - even where the putatively noncombatant populace openly supports the immoral use of force by its military.
Dunlap, Charles J., Jr.
core +2 more sources
Value Gaps in the Planetary Matrix of the World Community as a Limitrophe of War and Peace [PDF]
The article describes the problem of spontaneous transformation of the planetary matrix of the social world, moving from the cell to the network structure, resulting not only in the changes of the world system of the planetary community, the shapes of ...
Kalinichenko, B. (Bohdan)
core +2 more sources
Proportionality in cyberwar and just war theory
Which harms and benefits should be viewed as relevant when considering whether to launch cyber-measures? In this article, we consider this question, which matters because it is central to determining whether cyber-measures should be launched.
Fredrik D. Hjorthen, James Pattison
doaj +1 more source
The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core +1 more source

