Results 31 to 40 of about 5,305 (181)

Creating and Implementing an Effective and Deterrent National Cyber Security Strategy

open access: yesJournal of Engineering, Volume 2020, Issue 1, 2020., 2020
This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. With the aim of responding to and ensuring cyber security effectively, studies on which pathways should be followed and what methods should be used to develop, create, and implement a NCSS are being conducted in Turkey,
Mustafa Senol   +2 more
wiley   +1 more source

Rettet die Welt durch Erzählen! Wie das Crossmedia-Projekt netwars/ out of CRTL den Cyberwar verhindern will und warum das (auch) für den Deutschunterricht interessant ist

open access: yesMedien im Deutschunterricht, 2019
Vorgestellt wird das deutsche Crossmedia-Projekt Netwars – out of CRTL(2014/15), das über ein inter- und transmediales Medienensemble (interaktive Web-Seiten, Dokumentarfilm, Romane und Hörbücher, interaktiver App-Comic) auf die Gefahren von ...
Matthis Kepser
doaj   +1 more source

Warfighting for cyber deterrence: a strategic and moral imperative [PDF]

open access: yes, 2017
Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War ...
Lonsdale, David J.
core   +1 more source

Cyberwar and Mediation Theory [PDF]

open access: yesDelphi - Interdisciplinary Review of Emerging Technologies, 2019
Cyberwar (military operations conducted via computer networks) is often downplayed compared to traditional military operations as they are largely invisible to outside observers, difficult to convincingly attribute to a particular source and rarely cause physical damage or obvious harm.
Gertz, Nolen   +2 more
openaire   +1 more source

Cyberattacks and the Erosion of State Sovereignty [PDF]

open access: yesAnalele Universităţii din Oradea. Relaţii Internaţionale şi Studii Europene
This paper will tackle the issue of cyberattacks and the Erosion of State Sovereignty as cyberattacks have become a significant challenge to state sovereignty in the 21st century, threatening traditional concept of territorial control as well as the ...
Ana Maria COSTEA, Mihail CARADAICĂ
doaj   +1 more source

Computable Rationality, NUTS, and the Nuclear Leviathan [PDF]

open access: yes, 2018
This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it ...
Amadae, S. M.
core   +1 more source

The End of Innocence: Rethinking Noncombatancy in the Post-Kosovo Era [PDF]

open access: yes, 2000
The protection of civilians and their property in war is an accepted norm of international law - even where the putatively noncombatant populace openly supports the immoral use of force by its military.
Dunlap, Charles J., Jr.
core   +2 more sources

Value Gaps in the Planetary Matrix of the World Community as a Limitrophe of War and Peace [PDF]

open access: yes, 2018
The article describes the problem of spontaneous transformation of the planetary matrix of the social world, moving from the cell to the network structure, resulting not only in the changes of the world system of the planetary community, the shapes of ...
Kalinichenko, B. (Bohdan)
core   +2 more sources

Proportionality in cyberwar and just war theory

open access: yesEthics & Global Politics, 2023
Which harms and benefits should be viewed as relevant when considering whether to launch cyber-measures? In this article, we consider this question, which matters because it is central to determining whether cyber-measures should be launched.
Fredrik D. Hjorthen, James Pattison
doaj   +1 more source

The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]

open access: yes, 2012
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core   +1 more source

Home - About - Disclaimer - Privacy