Show simple item record

dc.contributor.authorBrantly, AFen_US
dc.date.accessioned2018-06-13T14:17:45Z
dc.date.available2018-06-13T14:17:45Z
dc.date.issued2018-05-30en_US
dc.identifier.urihttp://hdl.handle.net/10919/83534
dc.description.abstractWhat is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? Is it possible demonstrate credibility with either in-domain or cross-domain signaling or is cyberspace fundamentally ill-suited to the application of deterrence frameworks? Building on concepts from both rational deterrence theory and cognitive theories of deterrence this work attempts to leverage relevant examples from both within and beyond cyberspace to examine applicability of deterrence in the digital age and for digital tools in an effort to shift the conversation from Atoms to Bits and Bytes.en_US
dc.format.extent31 - 53 page(s)en_US
dc.publisherNato Ccd Coeen_US
dc.subjectCyberen_US
dc.subjectDeterrenceen_US
dc.subjectConflicten_US
dc.subjectNATOen_US
dc.titleThe Cyber Deterrence Problemen_US
dc.typeConference proceeding
dc.description.versionPublished (Publication status)en_US
dc.description.notesfalse (Extension publication?)en_US
dc.title.serial2018 10th International Conference on Cyber Conflicten_US
dc.type.otherArticleen_US
dc.identifier.volume10en_US
dc.identifier.orcidBrantly, AF [0000-0003-4193-3985]en_US
dcterms.dateAccepted2018-03-01en_US
pubs.organisational-group/Virginia Tech
pubs.organisational-group/Virginia Tech/All T&R Faculty
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciences
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciences/CLAHS T&R Faculty
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciences/Political Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record