Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (10)
- International Relations (9)
- Political Science (9)
- Engineering (2)
- Business (1)
-
- Communication (1)
- Computational Engineering (1)
- Computer Engineering (1)
- Defense and Security Studies (1)
- Industrial Engineering (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Organizational Behavior and Theory (1)
- Organizational Communication (1)
- Other Computer Engineering (1)
- Other Operations Research, Systems Engineering and Industrial Engineering (1)
- Public Affairs, Public Policy and Public Administration (1)
- Science and Technology Studies (1)
- Strategic Management Policy (1)
Articles 1 - 13 of 13
Full-Text Articles in Entire DC Network
Command And Control For Cyberspace Operations - A Call For Research, Adam S. Morgan, Steve W. Stone
Command And Control For Cyberspace Operations - A Call For Research, Adam S. Morgan, Steve W. Stone
Military Cyber Affairs
The United States Department of Defense (DoD) declared cyberspace as an operational domain in 2011. The DoD subsequently formed US Cyber Command and the Cyber Mission Force to conduct operations to achieve national and military objectives in and through cyberspace. Since that time, the DoD has implemented and evolved through multiple command and control (C2) structures for cyberspace operations, derived from traditional military C2 doctrine, to achieve unity of effort across both the global cyberspace domain and with military operations in the physical domains (land, sea, air, and space). The DoD continues to struggle to adapt its C2 methods from …
Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka
Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka
Military Cyber Affairs
The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units …
Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier
Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier
Military Cyber Affairs
Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We …
Introduction To Command And Control Of Cyberspace Operations, Bobbie Stempfley
Introduction To Command And Control Of Cyberspace Operations, Bobbie Stempfley
Military Cyber Affairs
In this issue we look at the means and doctrine for command and control of cyberspace operations today and in the future.
China’S Quantum Quandary, Elsa B. Kania
Strategic Challenges Of Declining International Power For Democracies In A Hostile Cyber World: The Case Of China, Nigel Inkster
Strategic Challenges Of Declining International Power For Democracies In A Hostile Cyber World: The Case Of China, Nigel Inkster
Military Cyber Affairs
No abstract provided.
The Financial Sector’S Vulnerabilities, Villains, And Options For Defense, John T. Harvey
The Financial Sector’S Vulnerabilities, Villains, And Options For Defense, John T. Harvey
Military Cyber Affairs
The consequences of cyber attacks on the financial sector go well beyond those suffered by the individuals and firms directly involved and may even lead to the destabilization of the system itself. The concern is all the greater given that banks and similar institutions play a much more critical role than most people realize and the nature of their operation already invites risk taking at the best of times. Bad actors hoping to sow chaos surely understand the trouble they could cause by targeting the financial underpinning of our economy. This paper will argue that while the cyber defense of …
Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike?, Claudia Biancotti, Paolo Ciocca
Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike?, Claudia Biancotti, Paolo Ciocca
Military Cyber Affairs
The internet and the financial system show crucial affinities: both are tightly interconnected global networks whose orderly functioning is a prerequisite for economic prosperity. In financial and cyber crises alike, vulnerabilities are a consequence of distorted economic incentives, contagion is fast, and the most serious risk is loss of trust. Lessons learned from financial meltdowns translate to the cybersecurity world: stability cannot be achieved until policies are in place to address all of these issues. Steps have been taken to rectify incentives, as exemplified by recent European Union legislation. Data that helps identify weak nodes are still scarce, notwithstanding recent …
Systemic Cyber Risks And Defense: Valuation, Innovation And Strategic Implications, Pythagoras N. Petratos
Systemic Cyber Risks And Defense: Valuation, Innovation And Strategic Implications, Pythagoras N. Petratos
Military Cyber Affairs
No abstract provided.
Trouble On The High “C’S” – China, Cyber, And The Trading System, Robert Fisher
Trouble On The High “C’S” – China, Cyber, And The Trading System, Robert Fisher
Military Cyber Affairs
No abstract provided.
Strategy Needed To Protect National Sovereignty Of Us Telecommunications Backbone, Thomas Donahue
Strategy Needed To Protect National Sovereignty Of Us Telecommunications Backbone, Thomas Donahue
Military Cyber Affairs
No abstract provided.
Regaining The Technological Edge: Authoritarians, Democracies, It Innovation’S Future, Andrea Little Limbago
Regaining The Technological Edge: Authoritarians, Democracies, It Innovation’S Future, Andrea Little Limbago
Military Cyber Affairs
No abstract provided.
Countering "Made In China 2025": Strategy For Western Powers In A Cybered World, David Mussington
Countering "Made In China 2025": Strategy For Western Powers In A Cybered World, David Mussington
Military Cyber Affairs
No abstract provided.