Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
"This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace. Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. However, scholarly work on the relationship between AI and conflict in cyberspace has been produced along somewhat rigid disciplinary boundaries and an even more rigid sociotechnical divide - wherein technical and social scholarship are seldomly brought into a conversation. This is the first volume to address these themes through a comprehensive and cross-disciplinary approach. With the intent of exploring the question 'what is at stake with the use of automation in international conflict in cyberspace through AI?', the chapters in the volume focus on three broad themes, namely: (1) technical and operational, (2) strategic and geopolitical, and (3) normative and legal. These also constitute the three parts in which the chapters of this volume are organised, although these thematic sections should not be considered as an analytical or a disciplinary demarcation. This book will be of much interest to students of cyber-conflict, artificial intelligence, security studies and International Relations"--
Choose an application
Cyberspace operations (Military science) --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Ciberespai --- Ciència militar
Choose an application
The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.
Information warfare (International law) --- Cyberspace operations (Military science) --- Information warfare (International law). --- Cyberspace operations (Military science). --- Cyberspace operations (International law) --- International law --- Cyberwarfare (International law) --- War (International law) --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Law --- General and Others
Choose an application
Cyberspace operations (Military science) --- Military & Naval Science --- Law, Politics & Government --- Military Science - General --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Moral and ethical aspects --- General ethics --- Legal theory and methods. Philosophy of law --- Computer architecture. Operating systems
Choose an application
"In January 2014 Pope Francis called the Internet a "gift from God." Months later former Secretary of Defense, Leon Panetta, described cyber warfare as "the most serious threat in the 21st century," capable of destroying our entire infrastructure and crippling the nation. Already, cyber warfare has impacted countries around the world: Estonia in 2007, Georgia in 2008, and Iran in 2010; and, as with other methods of war, cyber technology has the ability to be used not only on military forces and facilities, but on civilian targets.Our computers have become spies and tools for terrorism, and a have allowed for a new, unchecked method of war .And yet, cyber warfare is still in its infancy, with inumerable possibilities and contingencies for how such a war may play out in the coming decades. Cyber War Taboo?: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare examines the international development of constraining norms for cyber warfare and predicts how those norms will unfold in the future. Using case studies for other emerging-technology weapons--chemical and biological weapons, strategic bombing, and nuclear weapons--author Brian Mazanec expands previous definitions of norm evolution theory and offers recommendations for citizens and U.S. policymakers and as they grapple with the impending reality of cyber war"--
Technological innovations --- Cyberterrorism --- Cyberspace operations (International law) --- Information warfare (International law) --- Criminal law --- International law --- Cyberwarfare (International law) --- War (International law) --- Law and legislation. --- Cyberspace operations (Military science) --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Cyberwar in International law --- Technological innovations Law and legislation --- Law and legislation
Choose an application
A fresh and refined appraisal of today's top cyber threats
Information warfare. --- Information warfare --- Cyberspace operations (Military science) --- Cyberspace --- Space and time --- Computers --- Telematics --- Military art and science --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- History. --- Political aspects. --- Security measures. --- Security systems --- Informationskrigsførelse --- Sikkerhedspolitik
Choose an application
"This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher.
Cyberspace operations (Military science) --- Cyberterrorism --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science
Choose an application
"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--
Cyberspace operations (Military science) --- Cyberterrorism. --- Technology and international relations. --- Internet and international relatins. --- International relations and technology --- Technology and international affairs --- International relations --- Technology --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Cyber war (Military science) --- Cyberwar (Military science) --- Military art and science --- International cooperation --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Cyberspace --- Teknologi --- Internationale relationer
Choose an application
Cyberspace operations (Military science) --- Cyberterrorism --- Balance of power --- Power, Balance of --- Power politics --- International relations --- Political realism --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Political aspects --- Economic aspects --- E-books --- Economic aspects. --- Political aspects.
Choose an application
Propagande, censure et désinformation d'un côté ; devoir de réserve, secret défense et silence dans les rangs de la « grande muette » d'un autre. Faire la guerre semble condamner la communication des armées à de tels extrêmes. Mais qu'en est-il aujourd'hui, avec l'internet et les réseaux sociaux, l'information continue et les lanceurs d'alerte, et une opinion publique de plus en plus sondée et souveraine ? Parallèlement, la surveillance géopolitique électronique, la numérisation du champ de bataille, l'arrivée des drones, robots et soldats augmentés sur les théâtres d'opérations changent aussi la donne. Reste que la guerre engage toujours et avant tout des relations entre des hommes sur le terrain. Elle est aussi profondément un acte de communication pour être d'abord un dialogue rompu, un affrontement avec l'altérité. Avec, comme horizon, à l'heure de la montée des nationalismes et la multiplication des revendications identitaires, un risque croissant d'incommunication.
Information technology. --- Military art and science --- Soldiers --- Cyberspace operations (Military science) --- Armed Forces and mass media. --- Data processing. --- Effect of technological innovations on. --- Mass media --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Armed Forces personnel --- Members of the Armed Forces --- Military personnel --- Military service members --- Service members --- Servicemen, Military --- Armed Forces --- Computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Military applications --- internet --- propagande --- censure --- communication --- information --- guerre
Listing 1 - 10 of 11 | << page >> |
Sort by
|