Cyber war versus cyber realities : cyber conflict in the international system / Brandon Valeriano, Ryan C. Maness.

Valeriano, Brandon.
Oxford New York : Oxford University Press, 2015.
Added to CLICnet on 09/29/2015


Check CLICnet for availability
Notes:

  • In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism — Provided by publisher.
  • What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism — Provided by publisher.
  • Machine generated contents note: — Preface — Acknowledgements — Chapter 1: The Contours of the Cyber Conflict World — Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations — Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era — Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists — Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus — Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations — Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear — Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations — Chapter 9: Conclusion — Tables and Figures.

Subjects:

Requested by Kurpiers, R.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>