China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence
نویسندگان
چکیده
منابع مشابه
Alternatives to Cyber Warfare: Deterrence and Assurance
Deterrence as practiced during the Cold War was largely defined in terms of capabilities to impose punishment in response to an attack; however, with growing concern over the proliferation of cyber technologies, deterrence has evolved to be understood more generally in terms of cost/benefit calculi, viewed from not only a national perspective, but also recognizing the importance of both friendl...
متن کاملCyber Espionage and Illegitimate Information Retrieval
One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage ther...
متن کاملStrategic Bypass Deterrence∗
In liberalized network industries, competitors can either compete for service using the existing infrastructure (access) or deploy their own capacity (bypass). We revisit this make-or-buy problem making two contributions to the literature. First we analyze both the profit maximizing behavior of an incumbent and the welfare maximizing behavior when the entrant chooses between access and bypass. ...
متن کاملIntroduction to Cyber Warfare and Cyber Terrorism
The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic mechanics of these attacks is usually through the use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Strategic Security
سال: 2011
ISSN: 1944-0464,1944-0472
DOI: 10.5038/1944-0472.4.2.1