CYBER POWER
DOI:
https://doi.org/10.29121/granthaalayah.v7.i7.2019.775Keywords:
Cyber Power, Cyber Dominance, Cyber Capabilities, Cyber Threat, Cyber Self-Defense, Cyber AttackAbstract [English]
Cyber capabilities are becoming more and more important in modern warfare. Strategists and decision-makers increasingly regard cyberspace as an indispensable weapon to achieve national objectives that can supplement the need for land, sea, air and space power. The concept of cyber power has received much attention in the U.S and around the world. This paper provides a short introduction to cyber power.
Downloads
References
J. M. Elbaum, “Cyber power in the 21st century,” Master’s Thesis, Wright-Patterson Air Force Base, Ohio, December 2008.
D. R. Coats, “Statement for the Record,” Worldwide Threat Assessment of The U.S intelligence Community, January 2019.
J. Chen and A. Dinerman, “On Cyber Dominance in Modern Warfare,” European Conference on Cyber Warfare and Security, July 2016.
D. H. Rumsfeld, “Quadrennial Defense Review Report” Washington, D.C. Department of Defense, February 2006, pp.25.
T. Jordan, Cyberpower: The Culture and Politics of Cyberspace and the Internet. London, UK: Routledge, 1999.
J. van Haaster, “Assessing cyber power,” 8th International Conference on Cyber Conflict, 2016. DOI: https://doi.org/10.1109/CYCON.2016.7529423
J. S. Nye, “Cyber power,” Harvard Kennedy School, Belfer Center for Science and International Affairs, May 2010.
A. Klimburg, “Mobilising cyber power,” Survival, vol. 53, no. 1, 2011, pp. 41-60. DOI: https://doi.org/10.1080/00396338.2011.555595
M. D. Young, “National cyber doctrine: the missing link in the application of American cyber power,” Journal of National Security Law & Policy, vol. 4, 2010, pp. 173-196.
J. Hunker, “Cyber war and cyber power issues for NATO doctrine,” NATO Defense College, Research Paper No. 62, November 2010.
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.