You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to much policy talk and concern about the future of warfare as well as the digital vulnerability of society. No Shortcuts provides a level-headed view of where we are in the militarization of cyberspace. In this book, Max Smeets bridges the divide between technology and policy to assess the necessary building blocks for states to develop a military cyber capacity. Smeets argues that for many states, the barriers to entry into conflict in cyberspace are currently too high. Accompanied by a wide range of empirical examples, Smeets shows why governments abilities to develop military cyber capabilities might change over time and explains the limits of capability transfer by states and private actors.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the b...
Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and interdisciplinary, but much of the literature has been organized according to discipline. Seeking to cross disciplinary boundaries, this timely book brings together researchers in fields ranging from international law, international relations, and political science to business studies and philosophy to explore the theme of responsible state behavior in cyberspace. . Divided into three parts, Governing Cyberspace first looks at current debates in and about international law and diplomacy in cyberspace. How does int...
"Because of both history and geography, the Finnish relationship with Russia is unique in Europe. At the same time the Finnish perception of Russia as a source of security challenges is acute. Finland is engaged in a debate over whether it would be desirable to seek membership of NATO in order to mitigate these challenges. A full and frank debate has been difficult because it is constrained by a range of political and societal taboos; nevertheless there are indicators that a move toward NATO is not impossible in the foreseeable future. If Finland were to opt for joining NATO, this would register in Russian defence and security thinking as a serious concern. Unlike the Baltic accession in 200...
"In the next decade and a half, China and India will become two of the world's indispensable powers--whether they rise peacefully or not. During that time, Asia will surpass the combined strength of North America and Europe in economic might, population size, and military spending. Both India and China will have vetoes over many international decisions, from climate change to global trade, human rights, and business standards. From her front row view of this colossal shift, first at the State Department and now as an advisor to American business leaders, Anja Manuel escorts the reader on an intimate tour of the corridors of power in Delhi and Beijing. Her encounters with political and busine...
`In a concise and intellectually engaging manner, European Security since the Fall of the Berlin Wall succeeds in illuminating real changes in European security, as well as consequent changes in academic thinking. Frederic Merand, Martial Foucault, and Bastien Irondelle clearly and precisely link the different theories and levels of analysis found throughout these essays to develop a convincing new research agenda for complex security phenomena. Readers will easily identify common themes and perspectives in this creative and appealing contribution to research.' Markus Kaim, Head of the International Security Division, German Institute for International and Security Affairs `Right from its introduction, European Security since the Fall of the Berlin Wall will generate significant interest for readers. Each essay contained in this collection represents an excellent piece of scholarship and an accessible and vital contribution to thinking about contemporary international security problems.' Sean Kay, Department of Politics and Government, Ohio Wesleyan University
Transforming NATO: New Allies, Missions, and Capabilities, by Ivan Dinev Ivanov, examines the three dimensions of NATO’s transformation since the end of the Cold War: the addition of a dozen new allies; the undertaking of new missions such as peacekeeping, crisis response, and stabilization; and the development of new capabilities to implement these missions. The book explains these processes through two mutually reinforcing frameworks: club goods theory and the concept of complementarities. NATO can be viewed as a diverse, heterogeneous club of nations providing collective defense to its members, who, in turn, combine their military resources in a way that enables them to optimize the All...
This collection of studies (the eighth by David Jacoby) covers a period witnessing intensive geographic mobility across the Mediterranean, illustrated by a growing number of Westerners engaging in pilgrimage, crusade, trading and shipping, or else driven by sheer curiosity. This movement also generated western settlement in the eastern Mediterranean region. A complex encounter of Westerners with eastern Christians and the Muslim world occurred in crusader Acre, the focus of two papers; a major emporium, it was also the scene of fierce rivalry between the Italian maritime powers. The fall of the crusader states in 1291 put an end to western mobility in the Levant and required a restructuring ...
Cyberwarfare—like the seismic shift of policy with nuclear warfare—is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge and blur the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with warfare. Espionage—as old as war itself—has technologically merged with acts of cyberwar as states threaten each other with prepositioned malware in each other’s cyberespionage-probed infrastructure. These two cyber shifts to warfare are agreed upon and followed by the United States, Russia, and China. What is not agreed upon in this shifting era of warfare are the policies on which cyberwarfare is based. In Shadow Warfare, Elizabeth Van Wie Davis charts these policies in three key actors and navigates the futures of policy on an international stage. Essential reading for students of war studies and security professionals alike.
Explains how existing and proposed law seek to tackle challenges posed by new and emerging technologies in war and peace.