메뉴 건너뛰기




Volumn 7, Issue 1, 2010, Pages

Leaving deterrence behind: War-fighting and national cybersecurity

Author keywords

cyberaggression; deterrence; Obama Administration

Indexed keywords


EID: 79952471637     PISSN: None     EISSN: 15477355     Source Type: Journal    
DOI: 10.2202/1547-7355.1636     Document Type: Article
Times cited : (21)

References (45)
  • 1
    • 1842607024 scopus 로고    scopus 로고
    • Attack and conquer: International anarchy and the offense-defense deterrence balance
    • Winter
    • Adams, Karen Ruth. 2003-04. "Attack and Conquer: International Anarchy and the Offense-Defense Deterrence Balance," International Security 28, 3 (Winter), 45-83.
    • (2003) International Security , vol.28 , Issue.3 , pp. 45-83
    • Ruth, A.K.1
  • 4
    • 0035536306 scopus 로고    scopus 로고
    • Rebuilding the foundations of offense-defense theory
    • August
    • Biddle, Stephen. 2001. "Rebuilding the Foundations of Offense-Defense Theory," Journal of Politics, 63, 3 (August), 741-744.
    • (2001) Journal of Politics , vol.63 , Issue.3 , pp. 741-744
    • Stephen, B.1
  • 6
    • 79952483764 scopus 로고    scopus 로고
    • The evolution of cyber warfare
    • February 27
    • Bruno, Greg. 2008. "The Evolution of Cyber Warfare," Council on Foreign Relations. February 27, 2008. http://www.cfr.org/publication/15577/ evolution-of-cyber-warfare.html?breadcrumb=% 2F.
    • (2008) Council on Foreign Relations
    • Greg, B.1
  • 7
    • 79959354085 scopus 로고    scopus 로고
    • Waging deterrence in the twenty-first century
    • Spring
    • Chilton, Kevin, General, and Greg Weaver. 2009. "Waging Deterrence in the Twenty-First Century," Strategic Studies Quarterly, (Spring), 31-42.
    • (2009) Strategic Studies Quarterly , pp. 31-42
    • Chilton, K.G.1    Weaver, G.2
  • 9
    • 79952459734 scopus 로고    scopus 로고
    • Intellisec: Decision Risk, and Forensics. July 509.
    • "Foreign Government Inspire Cyber Attacks on Corporate Targets." 2009. Intellisec: Decision Risk, and Forensics. July 5, 2009.http://www.intellisec.com/blog/2009/07/05/foreign-government-inside-cyber- attacks-on-corporate-targets-forensic-protection/
    • (2009) Foreign Government I.0 Nspire Cyber Attacks on Corporate Targets
  • 10
    • 84879987163 scopus 로고    scopus 로고
    • Malden, MA: Polity Press
    • Freedman, Lawrence. 2004. Deterrence. Malden, MA: Polity Press.
    • (2004) Deterrence
    • Freedman, L.1
  • 11
    • 79952462916 scopus 로고    scopus 로고
    • Gates: Cyber attack a constant threat
    • April 21, 2009
    • "Gates: Cyber Attack A Constant Threat." 2009. CBSnews.com, April 21, 2009. http://www.cbsnews.com/stories/2009/04/21/tech/main4959079.shtml
    • (2009) CBSnews
  • 12
    • 0031087039 scopus 로고    scopus 로고
    • What is the offense-defense balance and can we measure it?
    • Spring
    • Glaser, Charles L. and Chaim Kaufmann. 1998. "What is the Offense-Defense Balance and Can We Measure It?" International Security 22, 3 (Spring), 44-82.
    • (1998) International Security , vol.22 , Issue.3 , pp. 44-82
    • Glaser, C.L.1    Kaufmann, C.2
  • 15
    • 79952482585 scopus 로고    scopus 로고
    • Integrated security: A strategic response to anonymity and the problem of the Few
    • ed. Emily O. Goldman. Portland, OR: Frank Cass
    • Harknett, Richard J. 2004. "Integrated Security: A Strategic Response to Anonymity and the Problem of the Few." National Security in the Information Age. ed. Emily O. Goldman. Portland, OR: Frank Cass.'
    • (2004) National Security in the Information Age
    • Harknett, R.J.1
  • 16
    • 79952474092 scopus 로고    scopus 로고
    • State preferences, systemic constraints, and the absolute weapon
    • eds. T.V. Paul, Richard J. Harknett, and James J. Wirtz. Ann Arbor, MI: University of Michigan Press
    • 2000a. "State Preferences, Systemic Constraints, and the Absolute Weapon. In The Absolute Weapon Revisited. eds. T.V. Paul, Richard J. Harknett, and James J. Wirtz. Ann Arbor, MI: University of Michigan Press.
    • (2000) The Absolute Weapon Revisited
  • 17
    • 79952468284 scopus 로고    scopus 로고
    • Threat as outcome: The security challenge of information technology
    • Joint Center For International and Security Studies jciss.ucdavis.edu
    • 2000b "Threat as Outcome: The Security Challenge of Information Technology," ITIS Working Paper No. 1, Joint Center For International and Security Studies
    • (2000) ITIS Working Paper No. 1
  • 18
    • 0042428228 scopus 로고    scopus 로고
    • Information warfare and deterrence
    • Autumn
    • 1996. "Information Warfare and Deterrence." Parameters (Autumn), 93-107.
    • (1996) Parameters , pp. 93-107
  • 19
    • 0010139488 scopus 로고
    • The logic of conventional deterrence and the end of the cold War
    • Autumn
    • 1994. "The Logic of Conventional Deterrence and the End of the Cold War," Security Studies 4, 1 (Autumn), 86-114.
    • (1994) Security Studies , vol.4 , Issue.1 , pp. 86-114
  • 20
    • 85044814578 scopus 로고    scopus 로고
    • The Cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen
    • December
    • Harknett, Richard J. and James A. Stever. 2009. "The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen," Journal of Homeland Security and Emergency Management. 6, 1 (December).
    • (2009) Journal of Homeland Security and Emergency Management , vol.6 , pp. 1
    • Harknett, R.J.1    Stever, J.A.2
  • 21
    • 84974380232 scopus 로고
    • Cooperation under the security dilemma
    • Jervis, Robert. 1978. "Cooperation Under the Security Dilemma." World Politics 30, 2, 167-214.
    • (1978) World Politics , vol.30 , Issue.2 , pp. 167-214
    • Jervis, R.1
  • 22
    • 79952461854 scopus 로고    scopus 로고
    • North Korea behind cyber attacks: South's spy chief
    • com. October 29, 2009
    • Kim, Jack. 2009. "North Korea behind cyber attacks: South's spy chief." Reuters.com. October 29, 2009. http://www.reuters.com/article/ idUSTRE59T09B20091030.
    • (2009) Reuters
    • Kim, J.1
  • 23
    • 79952466050 scopus 로고    scopus 로고
    • What constitutes an act of war in cyberspace?
    • Masters paper presented to March 2008
    • Kinley, Kelli. 2008. "What Constitutes an Act of War in Cyberspace?" Masters paper presented to Air Force Institute of Technology, March 2008. http://handle.dtic.mil/100.2/ADA480404.
    • (2008) Air Force Institute of Technology
    • Kinley, K.1
  • 24
    • 0001148702 scopus 로고
    • The Offensive/defensive balance of military technology: A theoretical and historical analysis
    • June
    • Levy, Jack S. 1984. "The Offensive/Defensive Balance of Military Technology: A Theoretical and Historical Analysis." International Studies Quarterly 28, 2 (June), 219-238.
    • (1984) International Studies Quarterly , vol.28 , Issue.2 , pp. 219-238
    • Levy, J.S.1
  • 26
    • 79952466207 scopus 로고    scopus 로고
    • Information war, information peace
    • Spring
    • 1998. "Information War, Information Peace," Journal of International Affairs 51, 2 (Spring).
    • (1998) Journal of International Affairs , vol.51 , pp. 2
  • 27
    • 0034377604 scopus 로고    scopus 로고
    • Grasping the technological peace
    • Summer
    • Lieber, Keir A. 2000. "Grasping the Technological Peace." International Security 25, 1 (Summer), 71-104.
    • (2000) International Security , vol.25 , Issue.1 , pp. 71-104
    • Lieber, K.A.1
  • 28
    • 78751636824 scopus 로고    scopus 로고
    • After the Transistor, a Leap into the Microcosm
    • August 31, 2009
    • Markoff, John. 2009a. "After the Transistor, a Leap into the Microcosm." New York Times. August 31, 2009. http://www.nytimes.com/2009/ 09/01/science/01trans.html.
    • (2009) New York Times
    • Markoff, J.1
  • 29
    • 79952476230 scopus 로고    scopus 로고
    • Internet's anonymity makes cyberattack hard to trace
    • July 16, 2009
    • 2009b. "Internet's Anonymity Makes Cyberattack Hard to Trace." New York Times. July 16, 2009. http://www.nytimes.com/2009/07/17/technology/ 17cyber.html
    • (2009) New York Times
  • 30
    • 79952457997 scopus 로고    scopus 로고
    • Mouse click could plunge city into darkness, experts say
    • September 27, 2007
    • Meserve, Jeanne. 2007. "Mouse click could plunge city into darkness, experts say." CNN.com. September 27, 2007. http://www.cnn.com/2007/US/09/ 27/power.at.risk/index.html?iref=newssearch#cnnSTC
    • (2007) CNN.com
    • Meserve, J.1
  • 31
    • 79952464363 scopus 로고    scopus 로고
    • Capability of the people's republic of china to conduct cyber warfare and computer network exploitation
    • Prepared for October 9, 2009
    • Video Northrop Grumman. 2009. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Prepared for The US-China Economic and Security Review Commission, October 9, 2009. http://handle.dtic.mil/100.2/ADA509000.
    • (2009) The US-China Economic and Security Review Commission
    • Grumman, V.N.1
  • 35
    • 79952470256 scopus 로고    scopus 로고
    • Identity fraud up in total dollars, victims
    • February 9, 2009
    • Stempel, Jonathan. 2009. "Identity Fraud Up in Total Dollars, Victims." Reuters.com, February 9, 2009. http://www.reuters.com/article/ domesticNews/idUSTRE51831G20090209
    • (2009) Reuters.com
    • Stempel, J.1
  • 36
    • 79952477125 scopus 로고    scopus 로고
    • Youth sentenced in government hacking case
    • September 23, 2000
    • Stout, David. 2000. "Youth Sentenced in Government Hacking Case." New York Times. September 23, 2000. http://www.nytimes.com/2000/09/ 23/us/youth-sentenced-in-government-hacking-case.html.
    • (2000) New York Times
    • Stout, D.1
  • 39
    • 79952469091 scopus 로고    scopus 로고
    • 2006 U.S National Security Strategy
    • 2006 U.S. National Security Strategy. http://www.whitehouse.gov/nsc/nss/ 2006/.
  • 45
    • 79952461853 scopus 로고    scopus 로고
    • Information warfare survivability: Is the best defense a good offense?
    • Loyola University, Chicago IL. USA, July 2000
    • Yurcik, William. 2000. "Information Warfare Survivability: Is the Best Defense a Good Offense?" Proceedings of the 5th Annual Ethics and Technology Conference, Loyola University, Chicago IL. USA, July 2000.
    • (2000) Proceedings of the 5th Annual Ethics and Technology Conference
    • Yurcik, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.