You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
To what extent do cyberspace operations increase the risks of escalation between nation-state rivals? Scholars and practitioners have been concerned about cyber escalation for decades, but the question remains hotly debated. The issue is increasingly important for international politics as more states develop and employ offensive cyber capabilities, and as the international system is increasingly characterized by emergent multipolarity. In Escalation Dynamics in Cyberspace, Erica D. Lonergan and Shawn W. Lonergan tackle this question head-on, presenting a comprehensive theory that explains the conditions under which cyber operations may lead to escalation. In doing so, they challenge long-he...
This Research Handbook provides a rigorous analysis of cyberwarfare, a widely misunderstood field of contemporary conflict and geopolitical competition. Gathering insights from leading scholars and practitioners, it examines the actors involved in cyberwarfare, their objectives and strategies, and scrutinises the impact of cyberwarfare in a world dependent on connectivity.
"The idea of "cyber war" has played a dominant role both in academic and popular discourses concerning the nature of statecraft and conflict in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for advantage below the threshold of war? This book debates that question. The contributors unpack the conceptual and theoretical logics of the framing of cyber competition as an intelligence contest, particularly in the areas of information theft and manipulation. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts, and placing all of it in conversation with the larger fields of international relations and intelligence studies"--
How and why China has pursued information-age weapons to gain leverage against its adversaries How can states use military force to achieve their political aims without triggering a catastrophic nuclear war? Among the states facing this dilemma of fighting limited wars, only China has given information-age weapons such a prominent role. While other countries have preferred the traditional options of threatening to use nuclear weapons or fielding capabilities for decisive conventional military victories, China has instead chosen to rely on offensive cyber operations, counterspace capabilities, and precision conventional missiles to coerce its adversaries. In Under the Nuclear Shadow, Fiona Cu...
A highly original comprehensive history of US military medicine. Decisions to go to war are often framed in cost-benefit terms, and typically such assessments do not factor in longer term costs. However, recent dramatic improvements in American military medicine have had an unanticipated effect: saving more soldiers' lives has vastly increased long-term, downstream costs of war with profound consequences for global politics in an era of heightened great power competition. In Military Medicine and the Hidden Costs of War, Tanisha M. Fazal traces the modern history of medical treatment and casualty rates in American conflicts from the Civil War to the more recent counterinsurgency wars. As she...
Rethinking Cyber Warfare provides a fresh understanding of the role that digital disruption plays in contemporary international security and proposes a new approach to more effectively restrain and manage cyberattacks.
The Congressional Record is the official record of the proceedings and debates of the United States Congress. It is published daily when Congress is in session. The Congressional Record began publication in 1873. Debates for sessions prior to 1873 are recorded in The Debates and Proceedings in the Congress of the United States (1789-1824), the Register of Debates in Congress (1824-1837), and the Congressional Globe (1833-1873)
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.
Cyberspace has become the ultimate frontier and central issue of international conflict, geopolitical competition, and security. Emerging threats and technologies continuously challenge the prospect of an open, secure, and free cyberspace. Additionally, the rising influence of technology on society and culture increasingly pushes international diplomacy to establish responsible state behavior in cyberspace and internet governance against the backdrop of fragmentation and polarization. In this context, novel normative practices and actors are emerging both inside and outside the conventional sites of international diplomacy and global governance. In Hybridity, Conflict, and the Global Politic...
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. How much should we worry about cyber threats and their impact on our lives, society and international affairs? Are these security concerns real, exaggerated or just poorly understood? In this fully revised and updated second edition of their popular text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity today. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they...