Cyber persistence theory : (Record no. 13890)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02297cam a22002055i 4500 |
INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780197638255 |
INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780197638255 |
DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | TK5105 .F57 2022 |
Item number | 3 |
MAIN ENTRY--AUTHOR NAME | |
Personal name | Fischerkeller, Michael P., |
TITLE STATEMENT | |
Title | Cyber persistence theory : |
Remainder of title | redefining national security in cyberspace / |
Statement of responsibility, etc | Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett. |
EDITION STATEMENT | |
Edition statement | 1. |
Copyright Date | |
Place of publication | New York : |
Name of publisher | Oxford University Press, |
Year of publication or production | 2022. |
PHYSICAL DESCRIPTION | |
Number of Pages | xii,253 pages |
SERIES STATEMENT | |
Series statement | Bridging the gap |
SUMMARY, ETC. | |
Summary, etc | "Cyber persistence theory introduces a new logic and lexicon aligned to the empirical experience of cyber activity in international relations. The reality of State behavior and interaction in cyberspace has been quite different from the model of war and coercion upon which many countries base their cyber strategies. This unexpected reality has developed because security in and through cyberspace rests on a distinct set of features that differ from the dominant security paradigms associated with nuclear and conventional weapons environments. Cyber persistence theory posits the existence of a distinct strategic environment based on the logic of exploitation rather than coercion. To achieve security in this cyber strategic environment, States must engage in initiative persistence, continuously setting and maintaining the conditions of security in their favour. The theory introduces the key concept of the cyber fait accompli and addresses the potential for cyber stability through a tacit bargaining process. The book provides empirical evidence of strategic cyber campaigning and details how the cyber strategic environment can impact State behaviour with a case study of the United States. The cyber strategic environment requires its own theory to achieve security. Whereas security requires States to triumph in war in the conventional environment and avoid war in the nuclear environment, States in the cyber strategic environment may have a true alternative to war in order to achieve strategically relevant outcomes. Understanding how States will leverage that alternative is the central question of early 21st century international security"-- |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | cyber security |
ADDED ENTRY--PERSONAL NAME | |
Personal name | Goldman, Emily O., |
ADDED ENTRY--PERSONAL NAME | |
Personal name | Harknett, Richard J., |
ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Permanent Location | Current Location | Date acquired | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|
Gabriel Afolabi Ojo Central Library (Headquarters). | Gabriel Afolabi Ojo Central Library (Headquarters). | 11/05/2024 | TK5105 .F57 2022 | 0194494 | Books |
Gabriel Afolabi Ojo Central Library (Headquarters). | Gabriel Afolabi Ojo Central Library (Headquarters). | 11/05/2024 | TK5105 .F57 2022 | 0194495 | Books |
Gabriel Afolabi Ojo Central Library (Headquarters). | Gabriel Afolabi Ojo Central Library (Headquarters). | 11/05/2024 | TK5105 .F57 2022 | 0194496 | Books |