Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Leiden University Sc...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
addClaim

Cyber warfare

critical perspectives
Authors: Osinga, F.P.B.; Ducheine, P.A.L.; Soeters, J.;

Cyber warfare

Abstract

Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the military. This manmade and virtual sphere brings along opportunities and threats. In this book, academics of the Netherlands Defence Academy as well as specialists and military professionals from other institutions analyse developments in cyber security. The authors use various fields of expertise, enabling them to apply a truly multi-disciplinary approach. Cyber threats affect states’ vital interests. By consequence, responses are required that need to come from public authorities as well as organizations on the market and in civil society. Additionally, this is not a national state’s affair; cyber threats are an international concern.This collection of essays questions the premises and scenarios on which policy responses are based. Are these scenarios describing real or imaginary threats? A number of contributions specifically deal with this issue. This volume also covers the process of ‘securitization’, the legal aspects of cyber operations, the use of social media in military operations as well as an economic analysis of the costs of cyber dangers. Furthermore, the authors analyse organisational responses to cyber threats. Resilience is the central term in this respect, both at the individual and the organisational level of military HQs and strategic network management. An analysis based on operations research and game theory illustrates the vulnerabilities of digital networks. No matter how dangerous cyber threats may look at face value, one should not overdramatise the dangers, as the last chapters seem to imply.In all contributions, the authors have attempted to combine academic theory with practical views and suggestions. This makes this book valuable not only for people from academic life, but particularly also for people who struggle with the intricacies and worries of cyber threats in their everyday (professional) life.

Country
Netherlands
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Related to Research communities
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!