Limit this search to....

Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes: A Comparison of Territorial and Weapons-Based Regimes
Contributor(s): Manjikian, Mary (Author), Strategic Studies Institute (U S ) (Editor), Army War College (U S ) (Editor)
ISBN: 1584876662     ISBN-13: 9781584876663
Publisher: Department of the Army
OUR PRICE:   $12.35  
Product Type: Paperback
Published: July 2015
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Additional Information
BISAC Categories:
- Computers | Information Technology
- Computers | Security - Cryptography
- Political Science | International Relations - Arms Control
LCCN: 2018400973
Physical Information: 84 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
An analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms regarding what is and is not a moral and ethical use of these technologies. It may be possible for academics and policymakers to come together to work for a ban or build-down on cyber weapons patterned on international efforts to ban chemical and biological weapons and implement export regimes to control the export of code which may form the components of cyber weapons. If we conceptualize cyberspace as territory, we can also learn from the example of territorially-based confidence-building measures such as those implemented along the Indo-Pakistan border. This approach stresses the importance of developing notification procedures to prevent misperceptions and the escalation spiral, as well as communicating regularly to establish trust between all parties. The case studies presented here illustrate the promises and pitfalls of each approach and offer valuable warnings to policymakers seeking to implement such measures in cyberspace. They show what happens when not everyone in a regime is equally committed to a specific outcome by illustrating the difficulties of monitoring compliance in confidence-building regimes, and show the ways in which doctrines and confidence-building measures may not be perfectly aligned.

Related items:

Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01128-1

Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01094-3

Cyberterrorism After Stuxnet can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01117-6

Legality in Cyberspace: An Adversary View can be found at this link: https: //bookstore.gpo.gov/products/sku/008-000-01108-7

Cyber Defense: An International View can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01194-0

The Rise of Iwar: Identity, Information, and the Individualization of Modern Warfare is available here: https: //bookstore.gpo.gov/products/sku/008-000-01198-2

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01210-5