{"title":"第一次全面战争与社会技术战争体系","authors":"Jordan Richard Schoenherr","doi":"10.1109/MTS.2023.3299315","DOIUrl":null,"url":null,"abstract":"Warcraft Evolves by identifying and adapting the technical and functional affordances of technologies to exploit vulnerabilities in adversaries’ defenses and defend against their attacks \n<xref>[1]</xref>\n. Nowhere is this arms race more apparent than cybersecurity wherein zero-day vulnerabilities are identified and exploited at an ever-growing rate \n<xref>[2]</xref>\n. Cybersecurity, however, is not limited to hardware and software. Cyberoperations require an understanding of the larger sociotechnical system that includes individual users and groups, for example, governmental, industry, and nongovernmental organizations. Indeed, the failure to identify the technical and functional affordances that allow for zero-day vulnerabilities illustrates the ambiguous and ill-defined nature of “cyberspace.”","PeriodicalId":2,"journal":{"name":"ACS Applied Bio Materials","volume":null,"pages":null},"PeriodicalIF":4.6000,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The First Total War and the Sociotechnical Systems of Warfare\",\"authors\":\"Jordan Richard Schoenherr\",\"doi\":\"10.1109/MTS.2023.3299315\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Warcraft Evolves by identifying and adapting the technical and functional affordances of technologies to exploit vulnerabilities in adversaries’ defenses and defend against their attacks \\n<xref>[1]</xref>\\n. Nowhere is this arms race more apparent than cybersecurity wherein zero-day vulnerabilities are identified and exploited at an ever-growing rate \\n<xref>[2]</xref>\\n. Cybersecurity, however, is not limited to hardware and software. Cyberoperations require an understanding of the larger sociotechnical system that includes individual users and groups, for example, governmental, industry, and nongovernmental organizations. Indeed, the failure to identify the technical and functional affordances that allow for zero-day vulnerabilities illustrates the ambiguous and ill-defined nature of “cyberspace.”\",\"PeriodicalId\":2,\"journal\":{\"name\":\"ACS Applied Bio Materials\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2023-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACS Applied Bio Materials\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10260690/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATERIALS SCIENCE, BIOMATERIALS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACS Applied Bio Materials","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10260690/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATERIALS SCIENCE, BIOMATERIALS","Score":null,"Total":0}
The First Total War and the Sociotechnical Systems of Warfare
Warcraft Evolves by identifying and adapting the technical and functional affordances of technologies to exploit vulnerabilities in adversaries’ defenses and defend against their attacks
[1]
. Nowhere is this arms race more apparent than cybersecurity wherein zero-day vulnerabilities are identified and exploited at an ever-growing rate
[2]
. Cybersecurity, however, is not limited to hardware and software. Cyberoperations require an understanding of the larger sociotechnical system that includes individual users and groups, for example, governmental, industry, and nongovernmental organizations. Indeed, the failure to identify the technical and functional affordances that allow for zero-day vulnerabilities illustrates the ambiguous and ill-defined nature of “cyberspace.”