首页 > 最新文献

Journal of Strategic Security最新文献

英文 中文
Disrupting Deterrence Signaling: Examining the Fifth Wave of Technology’s Impact 扰乱威慑信号:检查第五波技术的影响
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2109
Brendan Balestrieri
A critical component of deterrence is signaling, or how states communicate desired images of themselves and their intentions.[i] While scholars advocate for a re-examination of classical deterrence theories in light of the emergence of artificial intelligence (AI) and autonomous systems, some view the impact of AI and autonomy as a force that will diminish human agency as a component of deterrence and interactions between nations. This article argues the contrary and posits that the emergence of AI and autonomous systems will magnify the importance of human agency by enabling decision-makers to more accurately gauge credibility, will-to-fight factors, and the national resolve of their opponents based on aggregated sentiment analysis and psychological profiling of civilian populations. Furthermore, this article contends that traditional forms of signaling are undermined by the pervasiveness of AI, autonomous systems, social media, metadata, and the ability of nation-state actors to more accurately surmise the credibility and national resolve of an opponent.[i] Robert Jervis, Perception and Misperception in International Politics, New Edition (Princeton: Princeton University Press, 1976), xvi, https://www.jstor.org/stable/j.ctvc77bx3.
威慑的一个关键组成部分是信号,即国家如何传达自己和意图的理想形象。[i]虽然学者们主张根据人工智能(AI)和自治系统的出现重新审视经典威慑理论,但一些人认为,人工智能和自治的影响将削弱人类作为威慑和国家间互动组成部分的力量。本文提出了相反的观点,并认为人工智能和自主系统的出现将放大人类机构的重要性,使决策者能够更准确地衡量可信度、战斗意愿因素,以及基于总体情绪分析和平民人口心理特征的对手的国家决心。此外,本文认为,传统的信号形式受到人工智能、自治系统、社交媒体、元数据的普遍存在以及民族国家行为体更准确地猜测对手的可信度和国家决心的能力的破坏。[1]罗伯特·杰维斯:《国际政治中的感知与误解》,普林斯顿:普林斯顿大学出版社,1976年版,第16页,https://www.jstor.org/stable/j.ctvc77bx3。
{"title":"Disrupting Deterrence Signaling: Examining the Fifth Wave of Technology’s Impact","authors":"Brendan Balestrieri","doi":"10.5038/1944-0472.16.2.2109","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2109","url":null,"abstract":"A critical component of deterrence is signaling, or how states communicate desired images of themselves and their intentions.[i] While scholars advocate for a re-examination of classical deterrence theories in light of the emergence of artificial intelligence (AI) and autonomous systems, some view the impact of AI and autonomy as a force that will diminish human agency as a component of deterrence and interactions between nations. This article argues the contrary and posits that the emergence of AI and autonomous systems will magnify the importance of human agency by enabling decision-makers to more accurately gauge credibility, will-to-fight factors, and the national resolve of their opponents based on aggregated sentiment analysis and psychological profiling of civilian populations. Furthermore, this article contends that traditional forms of signaling are undermined by the pervasiveness of AI, autonomous systems, social media, metadata, and the ability of nation-state actors to more accurately surmise the credibility and national resolve of an opponent.\u0000[i] Robert Jervis, Perception and Misperception in International Politics, New Edition (Princeton: Princeton University Press, 1976), xvi, https://www.jstor.org/stable/j.ctvc77bx3.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48776858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Brave New World of Third Party Location Data 第三方位置数据的美丽新世界
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2070
Shelby Brennan, Stephen Coulthart, Brian Nussbaum
The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.
第三方位置数据(3PLD)——由智能设备捕获并由“数据代理”出售的地理空间数据——用于情报和调查的使用每年都在增加。该数据源为分析人员和决策者提供了更好地了解和应对从普通罪犯到恐怖分子的一系列安全威胁的机会。然而,与社交媒体情报(SOCMINT)等其他新兴的强大情报来源一样,3PLD也必须由政府合法使用。我们认为,在美国,围绕这些数据的法律框架尚不清楚。由于法律的模糊性以及技术的进步,我们注意到政府滥用的可能性更大。与此同时,恶意行为者正在以威胁安全的方式使用3PLD。我们认为,在商业可用位置数据的勇敢新世界中,需要各种利益相关者采取行动来应对这些挑战。
{"title":"The Brave New World of Third Party Location Data","authors":"Shelby Brennan, Stephen Coulthart, Brian Nussbaum","doi":"10.5038/1944-0472.16.2.2070","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2070","url":null,"abstract":"The use of third-party location data (3PLD)—geospatial data captured by smart devices and sold by ‘data brokers’—for intelligence and investigations is increasing each year. This data source provides opportunities for analysts and decision makers to better understand as well as counter a host of security threats from common criminals to terrorists. However, and like other emerging and potent sources of intelligence like social media intelligence (SOCMINT), 3PLD must also be wielded legitimately by the government. We argue that the in the US context the legal framework surrounding these data is unclear. Due to the legal ambiguity as well as technological advancements, we note that misuse by the government is more likely to occur. Concurrently, malicious actors are using 3PLD in ways that threaten security. We argue action from a variety of stakeholders will be necessary to navigate these challenges in the brave new world of commercially available location data.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41821827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022. 贩卖数据:中国如何赢得数字主权之战。安妮·科卡斯著。牛津:牛津大学出版社,2022。
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2142
C. Bronk
{"title":"Trafficking Data: How China is Winning the Battle for Digital Sovereignty. By Aynne Kokas. Oxford: Oxford University Press, 2022.","authors":"C. Bronk","doi":"10.5038/1944-0472.16.2.2142","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2142","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41892911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023. 《修复美国网络安全》,拉里·克林顿编,乔治城大学出版社,2023年。
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2141
M. Peters
{"title":"Fixing American Cybersecurity ed. Larry Clinton, Georgetown University Press, 2023.","authors":"M. Peters","doi":"10.5038/1944-0472.16.2.2141","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2141","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42774037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021. 抵制驱逐:拉丁美洲的受害者、罪犯和国家。作者:Eduardo Moncada。剑桥大学出版社,2021。
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2144
N. Barnes
{"title":"Resisting Exortion: Victims, Criminals, and States in Latin America. By Eduardo Moncada. Cambridge University Press, 2021.","authors":"N. Barnes","doi":"10.5038/1944-0472.16.2.2144","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2144","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43069285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives 射频干扰和欺骗策略与犯罪动机的分类
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2081
Tegg Westbrook
This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.
本文提供了与特定犯罪目标相关的射频干扰和欺骗策略的分类。这是基于这样一个事实,即网络攻击者(主要是金融攻击者)的动机和策略是众所周知的,但当前文献中缺乏特定电磁干扰背后的动机。先前的研究也忽略了其他参与者使用干扰和欺骗设备的动机。目标是确定最理想的欺骗和干扰策略、可能的目标和可能的动机。文章发现:(a)以前关于这一主题的文献忽略了一些非国家行为者的动机,因此本研究旨在填补这一知识空白;(b) 在确定的8个参与者中,拒绝服务攻击(8个中有7个)以及所谓的诱饵欺骗(6个)、特洛伊木马欺骗(5个)和干扰犯罪(5)是最理想的策略;(c) 在确定的11种策略中,灰帽和黑帽黑客(11种中有11种)、恐怖分子(11种)和活动家(8种)可能会利用大多数已确定的策略。
{"title":"A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives","authors":"Tegg Westbrook","doi":"10.5038/1944-0472.16.2.2081","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2081","url":null,"abstract":"This article provides a taxonomy of radiofrequency (RF) jamming and spoofing tactics and strategies associated with specific criminal objectives. This is based on the fact that the motivations and strategies of cyber-attackers – predominantly financial – is well-known, but the motivations behind specific electromagnetic interferences is lacking in the current literature. Previous research has also overlooked the motivations of other actors using jamming and spoofing devices.\u0000The objective is to identify the most desirable spoofing and jamming strategies, likely targets, and likely motivations. The article finds that (a) previous literature on the subject overlooks a number of non-state actor motives, and therefore this research aims to fill this gap in knowledge; (b) out of 8 actors identified, denial of service attacks (7 out of 8), as well as so-called decoy spoofing (6), trojan spoofing (5), and jamming-enabled crime (5) are the most desirable strategies utilized; (c) out of 11 strategies identified, grey and black hat hackers (11 out of 11), terrorists (11) and activists (8), are likely to take advantage of most identified.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48915254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective 英国、加拿大和澳大利亚的反恐法律和政策:比较视角
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2072
N. Morag
This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.
本文探讨了英国、加拿大和澳大利亚反恐法律和政策的异同。加拿大和澳大利亚与英国形成对比,因为它们各自的反恐方法都是基于英国的方法,但在发展过程中考虑到了威胁的性质和范围的差异以及加拿大和澳大利亚不同的治理风格。这篇文章从以下方面审视每个国家:反恐法律;拘留和扰乱治安的做法;调查方法;情报和执法机构;以及外国战士的待遇。然后,文章就这些国家反恐法律和政策的演变和分歧得出了一些结论,并为未来的研究提出了一个问题。
{"title":"Counterterrorism Law and Policy in the United Kingdom, Canada, and Australia: A Comparative Perspective","authors":"N. Morag","doi":"10.5038/1944-0472.16.2.2072","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2072","url":null,"abstract":"This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws some conclusions regarding the evolution and divergence of counterterrorism law and policy in these countries and posits a question for future research.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43722512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021. 非洲情报机构:早期后殖民和当代挑战。Ryan Shaffer编辑。Lanham, MD: Rowman and Littlefield, 2021。
Q2 Social Sciences Pub Date : 2023-07-01 DOI: 10.5038/1944-0472.16.2.2143
Mitchel P. Roth,
{"title":"African Intelligence Services: Early Postcolonial and Contemporary Challenges. Edited by Ryan Shaffer. Lanham, MD: Rowman and Littlefield, 2021.","authors":"Mitchel P. Roth,","doi":"10.5038/1944-0472.16.2.2143","DOIUrl":"https://doi.org/10.5038/1944-0472.16.2.2143","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135154683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
China's Strategic Devaluing of American Social Capital 中国对美国社会资本的战略性贬值
Q2 Social Sciences Pub Date : 2023-04-01 DOI: 10.5038/1944-0472.16.1.2026
Garrett Martin
The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.
信息技术时代开辟了无数新的战场,各国通过这些战场相互交战。中国在强有力的经济议程背后推进了“三战”理论——政治战、舆论战和法律战。直接的金融投资和对其庞大的消费市场和廉价劳动力的严格控制,使他们在美国工业的关键部门,特别是通信领域拥有相当大的影响力。中国越来越多地获得叙事能力,开始表现为真正的文化霸权。这表明有能力通过改变价值观和行为来塑造美国的集体意识,并最终削弱人口中的社会纽带。因此,本文将信息时代战争的本质界定为社会资本的战略贬值。这种对抗性策略的重新定义可能有助于通过对当前使用的策略提供新的见解来对抗这种努力。
{"title":"China's Strategic Devaluing of American Social Capital","authors":"Garrett Martin","doi":"10.5038/1944-0472.16.1.2026","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2026","url":null,"abstract":"The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47376969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Cognitive Operations and Hybrid Warfare 现代认知作战与混合战争
Q2 Social Sciences Pub Date : 2023-04-01 DOI: 10.5038/1944-0472.16.1.2032
Yuriy Danyk, Chad Briggs
Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.
在混合战争的背景下探索认知战和作战的概念,包括网络技术如何促进更大的影响、控制和破坏对手的不对称机会。在与混合认知操作的联系中分析了研究领域。本文的目的是研究在网络空间和通过网络空间的认知行为的特征、理论和应用依据及其在混合冲突框架内可能产生的后果。
{"title":"Modern Cognitive Operations and Hybrid Warfare","authors":"Yuriy Danyk, Chad Briggs","doi":"10.5038/1944-0472.16.1.2032","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2032","url":null,"abstract":"Concepts of cognitive warfare and operations are explored in the context of hybrid warfare, including how cyber technologies promote greater asymmetric opportunities for influence, control, and undermining of one’s adversary. Research areas are analyzed in the interconnection with hybrid cognitive operations. The purpose of the article is to study the features and theoretical and applied substantiation of cognitive actions in cyberspace and through cyberspace and their possible consequences within the framework of hybrid conflicts.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135771493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Strategic Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1