Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (2)
- Computer Sciences (2)
- Databases and Information Systems (2)
- Defense and Security Studies (2)
- Engineering (2)
-
- Management Information Systems (2)
- Military and Veterans Studies (2)
- Organizational Behavior and Theory (2)
- Other Computer Sciences (2)
- Peace and Conflict Studies (2)
- Physical Sciences and Mathematics (2)
- Policy Design, Analysis, and Evaluation (2)
- Political Theory (2)
- Public Affairs (2)
- Public Affairs, Public Policy and Public Administration (2)
- Public Policy (2)
- Risk Analysis (2)
- Education (1)
- Gifted Education (1)
- Higher Education (1)
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Other Political Science
All Bark And No Byte: A Case Study On Nuclear Weapons' Role In Cyber Deterrence, Phuc Nguyen
All Bark And No Byte: A Case Study On Nuclear Weapons' Role In Cyber Deterrence, Phuc Nguyen
Honors Theses
In what some scholars consider a marked departure from its traditional policy, the U.S.' 2018 Nuclear Deterrence Posture Review declared that the U.S. would consider the use of nuclear weapons in response to "significant, non-nuclear strategic attacks." However, despite real-world examples of the type of significant cyberattacks on U.S., allied, or partner civilian population or infrastructure alluded to in the Review, the factors that might trigger multidomain escalation remain underexplored, which creates a credibility gap in the U.S.' deterrence policy. This paper explores these factors by providing a case study of the North Korean WannaCry and Russian NotPetya cyberattacks and …
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.