2019
DOI: 10.1080/13523260.2019.1581458
|View full text |Cite
|
Sign up to set email alerts
|

Disrupt and restraint: The evolution of cyber conflict and the implications for collective security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Cyber and digital developments that started at the end of the 20th century and continued at a dizzying pace at the beginning of the 21st century have highlighted the issue of managing the conflicts caused by cyber elements (Radanliev et al, 2018;Broadhurst, 2006;Lin, 2012). Cyber conflict management has provided taking important steps in the prevention of cyberattacks, cybersecurity against malware, elimination of conflicts arising from the virtual environment in international negotiations, protection of intellectual property and trade secrets, hate speech and discrimination in social media, and information security (Taillat, 2019).…”
Section: Theoretical Framework General View Of Cyber Conflict Managementmentioning
confidence: 99%
“…Cyber and digital developments that started at the end of the 20th century and continued at a dizzying pace at the beginning of the 21st century have highlighted the issue of managing the conflicts caused by cyber elements (Radanliev et al, 2018;Broadhurst, 2006;Lin, 2012). Cyber conflict management has provided taking important steps in the prevention of cyberattacks, cybersecurity against malware, elimination of conflicts arising from the virtual environment in international negotiations, protection of intellectual property and trade secrets, hate speech and discrimination in social media, and information security (Taillat, 2019).…”
Section: Theoretical Framework General View Of Cyber Conflict Managementmentioning
confidence: 99%
“…For the United States, cyberspace, by contrast, includes computer networks and the economic, industrial or military activities that depend on them. The threat is therefore more related to the ability of a competitor to use the high digitalization of these societies to gain an asymmetric advantage or cause catastrophic damage [16]. For example, cyber-intervention in the 2016 US presidential election resulted in mainstream Pearl Harbor references.…”
Section: Introductionmentioning
confidence: 99%