Deterrence, Influence, Cyber Attack, and Cyberwar

نویسنده

  • PAUL K. DAVIS
چکیده

* Paul K. Davis is a senior principal researcher at the RAND Corporation and a professor of policy analysis in the Pardee RAND Graduate School. His early studies were in the hard sciences and he received a Ph.D. in theoretical chemical physics at M.I.T. After working on strategic technology and systems analysis at the Institute for Defense Analyses, he joined the U.S. government to work on strategic arms limitation, which included a period with the U.S. delegation in Geneva. He then joined the Defense Department where he worked initially on strategic nuclear programs before becoming a senior executive directing analysis of defense strategy and programs for the Persian Gulf (and, later, other regions worldwide). Dr. Davis then moved to the RAND Corporation in Santa Monica, where his research has been in strategic planning under deep uncertainty (primarily defense planning), decisionmaking theory, resource allocation, deterrence, and advanced methods of modeling and analysis. In recent years, his work has drawn on social science to inform analysis of counterterrorism and counterinsurgency. Dr. Davis teaches graduate courses in the Pardee RAND Graduate School where he emphasizes interdisciplinary work connecting analysis, the hard and soft sciences, planning, and modeling. Dr. Davis has served on numerous studies for the National Academy of Sciences, Defense Science Board, and other organizations. He reviews for or serves as associate editor on a number of academic journals.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cooperation beats Deterrence in Cyberwar

This brief article argues for a narrow definition of cyberwar and a technology-centric approach to understanding its strategic implications. Based on a review of the underlying technologies, approaches to facilitating peace in this rather new form of confrontation will be derived. This brief discussion already shows that Cold War era strategies such as credible deterrence through retaliation ar...

متن کامل

The role of effects, saliencies and norms in US Cyberwar doctrine

The US approach to cybersecurity implicitly rests on an effects-based logic. That is, it presumes that the key question determining how the US and others will respond to attacks is what effects they have. Whether the effects come about as a result of cyber means or kinetic means is largely irrelevant. In this article, we explore this logic further, focusing on the question of when the US should...

متن کامل

Alternatives to Cyber Warfare: Deterrence and Assurance

Deterrence as practiced during the Cold War was largely defined in terms of capabilities to impose punishment in response to an attack; however, with growing concern over the proliferation of cyber technologies, deterrence has evolved to be understood more generally in terms of cost/benefit calculi, viewed from not only a national perspective, but also recognizing the importance of both friendl...

متن کامل

Silver Bullet Talks with Thomas Rid

You wrote a book called Cyber War Will Not Take Place. I think cyberwar is inevitable because of the highly vulnerable systems that we’ve surrounded ourselves with and that we depend on every day. What’s up with that orthogonal view? If we look at the substance here, we might not actually have that much disagreement. I agree that systems are highly insecure, especially control systems. Industri...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015