National Open University Library

Cyber persistence theory : (Record no. 13890)

MARC details
000 -LEADER
fixed length control field 02297cam a22002055i 4500
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780197638255
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780197638255
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number TK5105 .F57 2022
Item number 3
MAIN ENTRY--AUTHOR NAME
Personal name Fischerkeller, Michael P.,
TITLE STATEMENT
Title Cyber persistence theory :
Remainder of title redefining national security in cyberspace /
Statement of responsibility, etc Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett.
EDITION STATEMENT
Edition statement 1.
Copyright Date
Place of publication New York :
Name of publisher Oxford University Press,
Year of publication or production 2022.
PHYSICAL DESCRIPTION
Number of Pages xii,253 pages
SERIES STATEMENT
Series statement Bridging the gap
SUMMARY, ETC.
Summary, etc "Cyber persistence theory introduces a new logic and lexicon aligned to the empirical experience of cyber activity in international relations. The reality of State behavior and interaction in cyberspace has been quite different from the model of war and coercion upon which many countries base their cyber strategies. This unexpected reality has developed because security in and through cyberspace rests on a distinct set of features that differ from the dominant security paradigms associated with nuclear and conventional weapons environments. Cyber persistence theory posits the existence of a distinct strategic environment based on the logic of exploitation rather than coercion. To achieve security in this cyber strategic environment, States must engage in initiative persistence, continuously setting and maintaining the conditions of security in their favour. The theory introduces the key concept of the cyber fait accompli and addresses the potential for cyber stability through a tacit bargaining process. The book provides empirical evidence of strategic cyber campaigning and details how the cyber strategic environment can impact State behaviour with a case study of the United States. The cyber strategic environment requires its own theory to achieve security. Whereas security requires States to triumph in war in the conventional environment and avoid war in the nuclear environment, States in the cyber strategic environment may have a true alternative to war in order to achieve strategically relevant outcomes. Understanding how States will leverage that alternative is the central question of early 21st century international security"--
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term cyber security
ADDED ENTRY--PERSONAL NAME
Personal name Goldman, Emily O.,
ADDED ENTRY--PERSONAL NAME
Personal name Harknett, Richard J.,
ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Permanent Location Current Location Date acquired Full call number Accession Number Koha item type
Gabriel Afolabi Ojo Central Library (Headquarters). Gabriel Afolabi Ojo Central Library (Headquarters). 11/05/2024 TK5105 .F57 2022 0194494 Books
Gabriel Afolabi Ojo Central Library (Headquarters). Gabriel Afolabi Ojo Central Library (Headquarters). 11/05/2024 TK5105 .F57 2022 0194495 Books
Gabriel Afolabi Ojo Central Library (Headquarters). Gabriel Afolabi Ojo Central Library (Headquarters). 11/05/2024 TK5105 .F57 2022 0194496 Books

Powered by Koha

//