Military Cyber Affairs最新文献

筛选
英文 中文
Introduction to MCA Issue, “Cyber, Economics, and National Security” MCA专题简介:“网络、经济与国家安全”
Military Cyber Affairs Pub Date : 2018-06-01 DOI: 10.5038/2378-0789.3.1.1042
C. Demchak
{"title":"Introduction to MCA Issue, “Cyber, Economics, and National Security”","authors":"C. Demchak","doi":"10.5038/2378-0789.3.1.1042","DOIUrl":"https://doi.org/10.5038/2378-0789.3.1.1042","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134359091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Global Commons to Territorial Seas: A Naval Analogy for the Nationalization of Cyberspace 从全球公域到领海:网络空间国家化的海军类比
Military Cyber Affairs Pub Date : 2018-06-01 DOI: 10.5038/2378-0789.3.1.1043
Sam J. Tangredi
{"title":"From Global Commons to Territorial Seas: A Naval Analogy for the Nationalization of Cyberspace","authors":"Sam J. Tangredi","doi":"10.5038/2378-0789.3.1.1043","DOIUrl":"https://doi.org/10.5038/2378-0789.3.1.1043","url":null,"abstract":"As one of the engines of modern globalization, the internet is perceived as having broken down barriers between cultures, ideologies and societies, and created a “democratization of technology.” An analogy generated by this perception is that cyberspace is a “global common” similar to the oceanic “high seas” to which individuals and nations can (or at least should) maintain equal and unfettered access. Not only is this analogy incorrect, its usage makes it is hard for political decision-makers to grasp the enormity of the threat to American infrastructure, global trade, and current prosperity posed by our cyber vulnerabilities. The reality is that authoritarian governments—with the Chinese Communist Party (CCP) in the lead—have transformed the cyber “global common” into “territorial seas” in which others pass unmolested only at their sufferance, and to which access can be denied. Unfortunately, once an analogy takes hold in the popular or academic minds, it becomes the central core of explanation and defies most logical counterarguments. The analogy of cyberspace as a global common must be killed and replaced if decisionmakers are to comprehend the future of the medium, which is not a return to unfettered global access. We must clearly admit that cyber activity sails on a mosaic of adjoining territorial seas, not a vast, open ocean. Cyberspace is a nationalizing and militarizing environment of coast guards and forward outposts. This different analogy will assist in creating a mind-set that helps insure that Western democratic infrastructure does not go down with the digital ship. 1 Please cite as: Tangredi, Sam J., “From Global Commons to Territorial Sea: A Naval Analogy for the Nationalization of Cyberspace,” in Demchak, Chris C. and Benjamin Schechter, eds. Military Cyber Affairs: Cyber, Economics, and National Security 3, no. 1 (2018). 2 Director, Institute for Future Warfare Studies, U.S. Naval War College 1 Tangredi: From Global Commons to Territorial Seas: A Naval Analogy for the Nationalization of Cyberspace Published by Scholar Commons, 2018","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130372628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Economics Primer for Cyber Security Analysts 网络安全分析师经济学入门
Military Cyber Affairs Pub Date : 2018-06-01 DOI: 10.5038/2378-0789.3.1.1036
J. Harvey
{"title":"An Economics Primer for Cyber Security Analysts","authors":"J. Harvey","doi":"10.5038/2378-0789.3.1.1036","DOIUrl":"https://doi.org/10.5038/2378-0789.3.1.1036","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131758465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Futures and the Justice Motive: Avoiding Pyrrhic Victory 网络未来与正义动机:避免得不偿失的胜利
Military Cyber Affairs Pub Date : 2018-06-01 DOI: 10.5038/2378-0789.3.1.1037
M. Raymond
{"title":"Cyber Futures and the Justice Motive: Avoiding Pyrrhic Victory","authors":"M. Raymond","doi":"10.5038/2378-0789.3.1.1037","DOIUrl":"https://doi.org/10.5038/2378-0789.3.1.1037","url":null,"abstract":": Evaluating, and choosing between, possible cyber futures requires making collective decisions about values. Tradeoffs exist in the design of any governance arrangement for information and communications technologies (ICTs). At minimum, policymakers will be required to choose between governance arrangements that optimize for speed and scale on the one hand, and those that optimize for diversity and decentralization on the other. As in any other political domain, every eventual outcome will create winners and losers, at least in relative terms. Actors dissatisfied with outcomes may perceive a discrepancy between entitlements and benefits. In some such cases, they will act on this justice motive. Existing research on justice as a motive for human behavior suggests that cases of conflict where one party is driven primarily by a justice motive may be associated both with intractable conflict, and with conflict characterized by lack of restraint. In the cyber domain, these kinds of conflicts will be most costly to advanced industrial democracies most dependent on ICTs. Pressing the first mover advantage in the digital domain is likely to foster resentment that will have negative consequences for the global cyber regime complex, and perhaps also for the rules and institutions of the international system writ large. Rule-making efforts in the ongoing process of global cyber regime complex formation should proceed in a deliberate manner and accept partial, voluntarist outcomes less likely to create highly dissatisfied parties. The article describes basic value tradeoffs associated with different cyber futures, reviews the literature on justice as a motive for human behavior, and outlines its implications for the future of the cyber domain. It ultimately concludes that the most likely outcome is that the United States will find itself in an increasingly isolated position.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127595347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prioritizing Strategic Cyberspace Lethality 优先考虑网络空间战略杀伤力
Military Cyber Affairs Pub Date : 1900-01-01 DOI: 10.5038/2378-0789.4.1.1049
Andrew J. Schoka
{"title":"Prioritizing Strategic Cyberspace Lethality","authors":"Andrew J. Schoka","doi":"10.5038/2378-0789.4.1.1049","DOIUrl":"https://doi.org/10.5038/2378-0789.4.1.1049","url":null,"abstract":"The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units in light of a continued struggle for available cyberspace personnel. Current force structure paradigms and command and control policies are identified as the key limiting factors of military lethality in cyberspace. This paper argues for ruthlessly prioritizing the elimination and improvement of these constraints in order to align Department of Defense policies with efforts to project strategic power in and through cyberspace.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121125423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to Command and Control of Cyberspace Operations 网络空间作战指挥与控制导论
Military Cyber Affairs Pub Date : 1900-01-01 DOI: 10.5038/2378-0789.4.1.1071
Bobbie Stempfley
{"title":"Introduction to Command and Control of Cyberspace Operations","authors":"Bobbie Stempfley","doi":"10.5038/2378-0789.4.1.1071","DOIUrl":"https://doi.org/10.5038/2378-0789.4.1.1071","url":null,"abstract":"In this issue we look at the means and doctrine for command and control of cyberspace operations today and in the future.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115949719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信