Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

SECURITISATION OF CYBER SPACE - FROM PRISM OF DETERRENCE STRATEGY

View through CrossRef
<p>Deterrence in cyber space has most often succumbed to the technical and legal limitations of digital and physical world respectively. Cyber deterrence aims to deter an (unwanted) cyber interaction by not only rendering it technically unfeasible but also increasing the ex-post facto costs for the aggressor. Despite major challenges confronting realization of "perfect in domain cyber deterrence", this paper aims to develop a novel subject-object relationship in a given cyber environment and makes a case of achieving credible "cyber deterrence" through comprehensive application of denial and punishment strategies. Doing so, while capitalizing on snap history of cyber interactions, it also projects the potential "cyber escalation ladder" and forecasts the future of cyber deterrence, which can guide the policy makers to meet desired ends. </p>
Institute of Electrical and Electronics Engineers (IEEE)
Title: SECURITISATION OF CYBER SPACE - FROM PRISM OF DETERRENCE STRATEGY
Description:
<p>Deterrence in cyber space has most often succumbed to the technical and legal limitations of digital and physical world respectively.
Cyber deterrence aims to deter an (unwanted) cyber interaction by not only rendering it technically unfeasible but also increasing the ex-post facto costs for the aggressor.
Despite major challenges confronting realization of "perfect in domain cyber deterrence", this paper aims to develop a novel subject-object relationship in a given cyber environment and makes a case of achieving credible "cyber deterrence" through comprehensive application of denial and punishment strategies.
Doing so, while capitalizing on snap history of cyber interactions, it also projects the potential "cyber escalation ladder" and forecasts the future of cyber deterrence, which can guide the policy makers to meet desired ends.
 </p>.

Related Results

Optimizing Cyber Deterrence
Optimizing Cyber Deterrence
Cyber deterrence is not like regular deterrence. In regular deterrence, say between two nuclear powers, the development of more nukes does not make hardened silos less effective on...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
Reassessing Nuclear Deterrence: Impacts on Global Security and International Relations
Reassessing Nuclear Deterrence: Impacts on Global Security and International Relations
In the context of an increasingly multipolar world and evolving geopolitical tensions, the doctrine of nuclear deterrence remains a pivotal yet contentious component of internation...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Focused deterrence, strategic management, and effective gun violence prevention
Focused deterrence, strategic management, and effective gun violence prevention
AbstractResearch SummaryThe evaluation literature suggests that focused deterrence strategies are effective in reducing gun violence. However, focused deterrence is notoriously dif...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...

Back to Top