Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the information age, and this is exactly what this book gives us. As the text shows, digital systems now mediate almost every effort to gather, store, display, analyze, and communicate information in military organizations. The book highlights how personnel now struggle with their own information systems as much as with the enemy.
Choose an application
Choose an application
The complexity of the 21st century threat landscape contrasts significantly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear & conventional arsenals continue to develop alongside antisatellite programs, autonomous robotics or drones, cyber operations, biotechnology, & other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence emerged near the end of the George W. Bush administration as policymakers & commanders confronted emerging threats to vital American military systems in space & cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, & cyberspace), & cross-domain deterrence poses serious problems in practice. This text steps back to assess the theoretical relevance of cross-domain deterrence for the field of international relations.
Deterrence (Strategy) --- Asymmetric warfare. --- Military art and science --- Technological innovations. --- Fighting --- Military power --- Military science --- Warfare --- Warfare, Primitive --- Naval art and science --- War --- Military policy --- Psychology, Military --- Strategy --- First strike (Nuclear strategy) --- Nuclear crisis stability
Choose an application
Global politics in the twenty-first century is complicated by dense economic interdependence, rapid technological innovation, and fierce security competition. How should governments formulate grand strategy in this complex environment? Many strategists look to deterrence as the answer, but how much can we expect of deterrence? Classical deterrence theory developed in response to the nuclear threats of the Cold War, but strategists since have applied it to a variety of threats in the land, sea, air, space, and cyber domains.
Deterrence (Strategy) --- Military art and science --- Asymmetric warfare. --- Warfare and Defence. --- Warfare & defence. --- Technological innovations.
Choose an application
Choose an application
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of 'informatization' reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks - predominantly from the United States. This book is a comprehensive analysis of China's cyberspace threats and policies. The contributors - Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West - address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
Choose an application
This volume contributes substantively to our understanding of China and cybersecurity, both complex topics on their own, by exploring how China's domestic political and economic system shapes its cyber activities. The collaboration also stands as an example of how Chinese and Western experts can work together to improve trust and understanding in an area of great mutual concern.
Choose an application
Choose an application
Listing 1 - 9 of 9 |
Sort by
|