메뉴 건너뛰기




Volumn 9781493909629, Issue , 2014, Pages 85-102

Dr. Strangeweb: Or how they stopped worrying and learned to love cyber war

Author keywords

[No Author keywords available]

Indexed keywords

CYBER TERROR; CYBER WAR; CYBER-TERRORISM; POWER; STATE BEHAVIOR;

EID: 84929891684     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4939-0962-9_5     Document Type: Chapter
Times cited : (7)

References (65)
  • 5
    • 70449660579 scopus 로고    scopus 로고
    • Transformation in concept and policy
    • Summer 2005
    • Cimbala SJ (2005) Transformation in concept and policy. Joint Force Q 38 (Summer 2005)
    • (2005) Joint Force Q , vol.38
    • Cimbala, S.J.1
  • 6
    • 84859934099 scopus 로고    scopus 로고
    • A cyberwar of ideas? Deterrence and norms in cyberspace
    • Stevens T (2012) A cyberwar of ideas? Deterrence and norms in cyberspace. Contemp Secur Pol 33(1):148-170. http://dx.doi.org/10.1080/13523260.2012.659597
    • (2012) Contemp Secur Pol , vol.33 , Issue.1 , pp. 148-170
    • Stevens, T.1
  • 7
    • 34247095107 scopus 로고    scopus 로고
    • Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?
    • Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Soc Change 46(4-5):223-238
    • (2006) Crime Law Soc Change , vol.46 , Issue.4-5 , pp. 223-238
    • Stohl, M.1
  • 8
    • 84867297056 scopus 로고    scopus 로고
    • Cybersecurity: A pre-history
    • Warner M (2012) Cybersecurity: a pre-history. Intell Natl Secur 27(5):781-799. http://dx.doi.org/10.1080/02684527.2012.708530
    • (2012) Intell Natl Secur , vol.27 , Issue.5 , pp. 781-799
    • Warner, M.1
  • 11
    • 0012443107 scopus 로고    scopus 로고
    • Networks, netwar and information age terrorism
    • Lesser A, Hoffman B, Arquilla J, Ronfeldt D, Zanini M eds, Rand, Santa Monica
    • Arquilla J, Ronfeldt D, Zanini M (1999) Networks, netwar and information age terrorism. In: Lesser A, Hoffman B, Arquilla J, Ronfeldt D, Zanini M (eds) Countering the new terrorism. Rand, Santa Monica, pp 39-84
    • (1999) Countering the New Terrorism , pp. 39-84
    • Arquilla, J.1    Ronfeldt, D.2    Zanini, M.3
  • 12
    • 80051748104 scopus 로고    scopus 로고
    • Mother Jones 2 April 2009
    • Aquino S (2009) Should Obama control the Internet? In: Mother Jones 2 April 2009. http://www.motherjones.com/politics/2009/04/should-obama-control-internet
    • (2009) Should Obama Control the Internet?
    • Aquino, S.1
  • 18
    • 85192421711 scopus 로고    scopus 로고
    • Georgia. 13 August 2008, via DefenseTech
    • Carroll W (2008) Cyber War 2.0-Russia v. Georgia. 13 August 2008. Available via DefenseTech. http://defensetech.org/2008/08/13/cyber-war-2-0-russia-v-georgia/xzz2PJhri1hS
    • (2008) Cyber War 2.0-Russia V
    • Carroll, W.1
  • 19
    • 84962062205 scopus 로고    scopus 로고
    • Computer networks in South Korea are paralyzed in cyberattacks
    • 23 March 2013
    • Choe S-H (2013) Computer networks in South Korea are paralyzed in cyberattacks. The New York Times 23 March 2013. https://www.nytimes.com/2013/03/21/world/asia/south-korea-computernetwork-crashes.html
    • (2013) The New York Times
    • Choe, S.-H.1
  • 23
    • 85192424427 scopus 로고    scopus 로고
    • Crypt Newsletter (2009) http://www.soci.niu.edu/~crypt/other/harbor.htm
    • (2009)
    • Crypt Newsletter1
  • 24
    • 85192405979 scopus 로고    scopus 로고
    • Nation unprepared for cyber war, experts say December 17, 2001
    • Dean J (2001) Nation unprepared for cyber war, experts say December 17, 2001. Government Executive. http://www.govexec.com/defense/2001/12/nation-unprepared-for-cyber-war-experts-say/10725
    • (2001) Government Executive
    • Dean, J.1
  • 25
    • 84937339440 scopus 로고    scopus 로고
    • Cyberterror and media-induced fears: The production of emergency culture
    • Debrix F (2001) Cyberterror and media-induced fears: the production of emergency culture. Strat J Theor Cult Polit 14(1):149-168
    • (2001) Strat J Theor Cult Polit , vol.14 , Issue.1 , pp. 149-168
    • Debrix, F.1
  • 26
    • 85032414967 scopus 로고    scopus 로고
    • Tracking the emerging arms race in cyberspace
    • Deibert R (2011) Tracking the emerging arms race in cyberspace. Bull Atom Scient 67:1
    • (2011) Bull Atom Scient , vol.67 , pp. 1
    • Deibert, R.1
  • 28
    • 85192409765 scopus 로고    scopus 로고
    • Fearing 'Cyber Katrina'
    • Business Week 18 February 2009
    • Epstein K (2009) Fearing 'Cyber Katrina', Obama candidate for Cyber Czar urges a "FEMA for the Internet". Business Week 18 February 2009. http://www.businessweek.com/the-thread/techbeat/archives/2009/02/fearing-cyber-k.html
    • (2009) Obama Candidate for Cyber Czar Urges a "FEMA for the Internet"
    • Epstein, K.1
  • 30
    • 34247170624 scopus 로고    scopus 로고
    • Bangs for the buck: A cost-benefit analysis of cyberterrorism
    • Giacomello G (2004) Bangs for the buck: a cost-benefit analysis of cyberterrorism. Stud Conflict Terrorism 27:387-408
    • (2004) Stud Conflict Terrorism , vol.27 , pp. 387-408
    • Giacomello, G.1
  • 31
  • 33
    • 84892166017 scopus 로고    scopus 로고
    • GReAT (Global Research & Analysis Team) (2012) Gauss abnormal distribution. http://www.securelist.com/en/analysis/204792238/Gauss-Abnormal-Distribution
    • (2012) Gauss Abnormal Distribution
  • 34
    • 27944448233 scopus 로고    scopus 로고
    • Washington Monthly
    • Green J (2002). The myth of cyber terrorism. Washington Monthly. http://www.washingtonmonthly.com/features/2001/0211.green. html. Accessed 1 Feb. 2006
    • (2002) The Myth of Cyber Terrorism
    • Green, J.1
  • 35
    • 84899950855 scopus 로고    scopus 로고
    • Cyber insecurity as a national threat: Overreaction from Germany, France and the UK?
    • Guitton C (2013) Cyber insecurity as a national threat: overreaction from Germany, France and the UK? Eur Secur 22(1):21-35
    • (2013) Eur Secur , vol.22 , Issue.1 , pp. 21-35
    • Guitton, C.1
  • 36
    • 71649085630 scopus 로고    scopus 로고
    • Digital disaster, cyber security, and the Copenhagen School
    • Hansen L, Nissenbuam H (2009) Digital disaster, cyber security, and the Copenhagen School. Int Stud Q 53:1155-1175
    • (2009) Int Stud Q , vol.53 , pp. 1155-1175
    • Hansen, L.1    Nissenbuam, H.2
  • 37
    • 85007146556 scopus 로고    scopus 로고
    • The spectrum of national responsibility for cyberattacks
    • Healey J (2011) The spectrum of national responsibility for cyberattacks. Brown J Int Aff 18(1):43-56
    • (2011) Brown J Int Aff , vol.18 , Issue.1 , pp. 43-56
    • Healey, J.1
  • 38
    • 80051989784 scopus 로고    scopus 로고
    • Cyberwar case study: Georgia 2008
    • Hollis, D (2011) Cyberwar case study: Georgia 2008. Small Wars J. http://smallwarsjournal.com/jrnl/art/cyberwar-case-study-georgia-2008
    • (2011) Small Wars J
    • Hollis, D.1
  • 44
    • 84880943193 scopus 로고    scopus 로고
    • Cybersecurity and cyberwarfare
    • Washington DC
    • Lewis JA, Timlin K (2011) Cybersecurity and cyberwarfare. CSIS, UNIDIR, Washington DC
    • (2011) CSIS, UNIDIR
    • Lewis, J.A.1    Timlin, K.2
  • 45
    • 79956266592 scopus 로고    scopus 로고
    • Defending a new domain: The Pentagon's cyberstrategy
    • Lynn III WJ (2010) Defending a new domain: the Pentagon's cyberstrategy. Foreign Affairs Sept/Oct. 2010. http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain
    • (2010) Foreign Affairs Sept/Oct. 2010
    • Lynn, W.J.1
  • 48
    • 84865569445 scopus 로고    scopus 로고
    • Cyber security without cyber war
    • O'Connell ME (2012) Cyber security without cyber war. J Conflict Secur Law 17(2):187-209
    • (2012) J Conflict Secur Law , vol.17 , Issue.2 , pp. 187-209
    • O'Connell, M.E.1
  • 49
    • 84876359228 scopus 로고    scopus 로고
    • New York City U. S. Department of Defense Office of the Assistant Secretary of Defense Public Affairs. News Transcript 11 October 2012
    • Panetta L (2012) Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City U. S. Department of Defense Office of the Assistant Secretary of Defense (Public Affairs). News Transcript 11 October 2012. http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136
    • (2012) Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security
    • Panetta, L.1
  • 50
    • 85192399505 scopus 로고    scopus 로고
    • Security firm discovers cyber-spy campaign
    • 14 January 2013
    • Perlroth N (2013) Security firm discovers cyber-spy campaign. The New York Times 14 January 2013. http://bits.blogs.nytimes.com/2013/01/14/security-firm-discovers-global-spy-campaign
    • (2013) The New York Times
    • Perlroth, N.1
  • 51
    • 84864166772 scopus 로고    scopus 로고
    • Denial-of-service: The Estonian Cyberwar and its implications for U. S. National Security
    • Richards J (2009) Denial-of-service: the Estonian Cyberwar and its implications for U. S. National Security. International Affairs Review 18:1. http://www.iar-gwu.org/node/65
    • (2009) International Affairs Review , vol.18 , pp. 1
    • Richards, J.1
  • 52
    • 84867650772 scopus 로고    scopus 로고
    • The New York Times 1 June 2012
    • Sanger DE (2012) Obama order sped up wave of cyberattacks against Iran. The New York Times 1 June 2012. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-ofcyberattacks-against-iran. html?pagewanted=all
    • (2012) Obama Order Sped Up Wave of Cyberattacks Against Iran
    • Sanger, D.E.1
  • 53
    • 84923964246 scopus 로고    scopus 로고
    • The New York Times 3 February 2013
    • Sanger DE, Shanker T (2013) Broad powers seen for Obama in cyberstrikes. The New York Times 3 February 2013. http://www.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-incyberstrikes.html?pagewanted=all&-r=0
    • (2013) Broad Powers Seen for Obama in Cyberstrikes
    • Sanger, D.E.1    Shanker, T.2
  • 55
    • 85192416305 scopus 로고    scopus 로고
    • chapter 2. 10 January 2002
    • Smith GC (2002) Compumetrically speaking, chapter 2. 10 January 2002. https://vmyths.com/column/2/2002/1/10
    • (2002) Compumetrically Speaking
    • Smith, G.C.1
  • 57
    • 84859934099 scopus 로고    scopus 로고
    • A cyberwar of ideas? Deterrence and norms in cyberspace
    • Stevens T (2012) A cyberwar of ideas? Deterrence and norms in cyberspace. Contemp Secur Pol 33(1):148-170. http://dx.doi.org/10.1080/13523260.2012.659597
    • (2012) Contemp Secur Pol , vol.33 , Issue.1 , pp. 148-170
    • Stevens, T.1
  • 59
    • 47249141396 scopus 로고
    • States, terrorism and state terrorism: The role of the superpowers
    • Slater R, Stohl M eds, Macmillan, London
    • Stohl M (1988) States, terrorism and state terrorism: the role of the superpowers. In: Slater R, Stohl M (eds) Current perspectives on international terrorism. Macmillan, London, pp 155-205
    • (1988) Current Perspectives on International Terrorism , pp. 155-205
    • Stohl, M.1
  • 60
    • 34247095107 scopus 로고    scopus 로고
    • Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?
    • Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Social Change 46:223-238
    • (2006) Crime Law Social Change , vol.46 , pp. 223-238
    • Stohl, M.1
  • 61
    • 85048941387 scopus 로고    scopus 로고
    • Al Qaeda and the Internet: The danger of "cyberplanning"
    • From Carlisle, Accessed 1 Feb. 2006
    • Thomas TL (2003) Al Qaeda and the Internet: the danger of "cyberplanning". Parameters 33(1):112-23, From Carlisle http://www.army.mil/usawc/Parameters/03spring/thomas.pdf. Accessed 1 Feb. 2006
    • (2003) Parameters , vol.33 , Issue.1 , pp. 112-123
    • Thomas, T.L.1
  • 63
    • 84867297056 scopus 로고    scopus 로고
    • Cybersecurity: A pre-history
    • Warner M (2012) Cybersecurity: a pre-history. Intell Natl Secur 27(5):781-799. http://dx.doi.org/10.1080/02684527.2012.708530
    • (2012) Intell Natl Secur , vol.27 , Issue.5 , pp. 781-799
    • Warner, M.1
  • 65
    • 85192428887 scopus 로고    scopus 로고
    • U. S. Army 639 War College, Carlisle Barracks, Pennsylvania, Accessed 1 March 2006
    • White CKC (1998) Cyber-terrorism: modem mayhem. U. S. Army 639 War College, Carlisle Barracks, Pennsylvania. http://stinet.dtic.mil/dticrev/a345705.pdf. Accessed 1 March 2006
    • (1998) Cyber-terrorism: Modem Mayhem
    • White, C.K.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.