Confidence Building in Cyberspace

- A Comparison of Territorial and Weapons-Based Regimes: A Comparison of Territorial and Weapons-Based Regimes

Bog
  • Format
  • Bog, paperback
  • Engelsk
  • 84 sider

Beskrivelse

An analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms regarding what is and is not a moral and ethical use of these technologies. It may be possible for academics and policymakers to come together to work for a ban or build-down on cyber weapons patterned on international efforts to ban chemical and biological weapons and implement export regimes to control the export of code which may form the components of cyber weapons. If we conceptualize cyberspace as territory, we can also learn from the example of territorially-based confidence-building measures such as those implemented along the Indo-Pakistan border. This approach stresses the importance of developing notification procedures to prevent misperceptions and the escalation spiral, as well as communicating regularly to establish trust between all parties. The case studies presented here illustrate the promises and pitfalls of each approach and offer valuable warnings to policymakers seeking to implement such measures in cyberspace. They show what happens when not everyone in a regime is equally committed to a specific outcome by illustrating the difficulties of monitoring compliance in confidence-building regimes, and show the ways in which doctrines and confidence-building measures may not be perfectly aligned.

Related items:

Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01128-1

Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01094-3

Cyberterrorism After Stuxnet can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01117-6

Legality in Cyberspace: An Adversary View can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01108-7

Cyber Defense: An International View can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01194-0

The Rise of Iwar: Identity, Information, and the Individualization of Modern Warfare is available here: https: //bookstore.gpo.gov/products/sku/008-000-01198-2

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01210-5

Læs hele beskrivelsen
Detaljer
  • SprogEngelsk
  • Sidetal84
  • Udgivelsesdato13-07-2015
  • ISBN139781584876663
  • Forlag Department of the Army
  • MålgruppeFrom age 18
  • FormatPaperback
  • Udgave0

Findes i disse kategorier...

Se andre, der handler om...

Velkommen til Saxo – din danske boghandel

Hos os kan du handle som gæst, Saxo-bruger eller Saxo-medlem – du bestemmer selv. Skulle du få brug for hjælp, sidder vores kundeservice-team klar ved både telefonerne og tasterne.

Om medlemspriser hos Saxo

For at købe bøger til medlemspris skal du være medlem af Saxo Premium, Saxo Shopping eller Saxo Ung. De første 7 dage er gratis for nye medlemmer. Medlemskabet fornyes automatisk og kan altid opsiges. Læs mere om fordelene ved vores forskellige medlemskaber her.

Machine Name: SAXO081