Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (4)
- International Relations (4)
- Political Science (4)
- Social and Behavioral Sciences (4)
- Computer Engineering (3)
-
- Computer Law (3)
- Digital Communications and Networking (3)
- Law (3)
- Other Computer Engineering (3)
- Cognitive Science (2)
- Computer Sciences (2)
- Computer and Systems Architecture (2)
- Information Security (2)
- Military, War, and Peace (2)
- National Security Law (2)
- Physical Sciences and Mathematics (2)
- Psychology (2)
- Systems Science (2)
- Arts and Humanities (1)
- Asian Studies (1)
- Business (1)
- Chinese Studies (1)
- Cognitive Psychology (1)
- Communication (1)
- Data Science (1)
- Defense and Security Studies (1)
- East Asian Languages and Societies (1)
- Education (1)
- Human Factors Psychology (1)
- Industrial Engineering (1)
Articles 1 - 7 of 7
Full-Text Articles in Entire DC Network
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Hypergaming For Cyber: Strategy For Gaming A Wicked Problem, Joshua A. Sipper
Hypergaming For Cyber: Strategy For Gaming A Wicked Problem, Joshua A. Sipper
Military Cyber Affairs
Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other information related capabilities (IRCs), namely electromagnetic warfare (EW), information operations (IO), and intelligence, surveillance, and reconnaissance (ISR), within an information warfare (IW) construct that serves to add to its multifaceted nature. In this cyber analysis, the concept of hypergaming will be defined and discussed in …
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka
Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka
Military Cyber Affairs
The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units …
Introduction To Command And Control Of Cyberspace Operations, Bobbie Stempfley
Introduction To Command And Control Of Cyberspace Operations, Bobbie Stempfley
Military Cyber Affairs
In this issue we look at the means and doctrine for command and control of cyberspace operations today and in the future.
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
Military Cyber Affairs
China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …