Cyberwar Redux

B. Buchanan
{"title":"Cyberwar Redux","authors":"B. Buchanan","doi":"10.1093/oxfordhb/9780198800682.013.14","DOIUrl":null,"url":null,"abstract":"The notion of cyberwar has held a central place in technology and security scholarship for several decades. With the continued aggression of modern government hacking operations, cyberwar has again emerged as a popular frame. This chapter shows how the present reality, though, has strayed far from the original concept and how a closer examination of state activities suggests a scope for hacking that is different and more limited than many expected. Drawing on case studies, this chapter shows how virtually all hacking activities fall short of war. They are instead variants of espionage, sabotage, and subversion. This refined framing offers important implications for deterrence, coercion, and operational practice.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oxfordhb/9780198800682.013.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The notion of cyberwar has held a central place in technology and security scholarship for several decades. With the continued aggression of modern government hacking operations, cyberwar has again emerged as a popular frame. This chapter shows how the present reality, though, has strayed far from the original concept and how a closer examination of state activities suggests a scope for hacking that is different and more limited than many expected. Drawing on case studies, this chapter shows how virtually all hacking activities fall short of war. They are instead variants of espionage, sabotage, and subversion. This refined framing offers important implications for deterrence, coercion, and operational practice.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络战争回来的
几十年来,网络战的概念一直在技术和安全学术领域占据核心地位。随着现代政府黑客行动的持续侵略,网络战再次成为一个流行的框架。本章展示了当前的现实是如何与最初的概念相去甚远的,以及对国家活动的更仔细研究如何表明,黑客活动的范围与许多人预期的不同,也更有限。通过案例研究,本章展示了几乎所有的黑客活动都没有达到战争的程度。相反,它们是间谍、破坏和颠覆的变体。这种精细化的框架为威慑、胁迫和操作实践提供了重要的含义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Assessing Harm from Cyber Crime Online Child Safety Securing the Critical National Infrastructure International Law for Cyberspace Managing Risk
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1