Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Exploring the Policies, Cybersecurit...
~
Scalise, Benjamin F., III.
Linked to FindBook
Google Book
Amazon
博客來
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare./
Author:
Scalise, Benjamin F., III.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
Description:
106 p.
Notes:
Source: Dissertations Abstracts International, Volume: 80-10, Section: B.
Contained By:
Dissertations Abstracts International80-10B.
Subject:
Information Technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13807364
ISBN:
9781392009857
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
Scalise, Benjamin F., III.
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 106 p.
Source: Dissertations Abstracts International, Volume: 80-10, Section: B.
Thesis (D.C.S.)--Colorado Technical University, 2019.
This item must not be sold to any third party vendors.
The purpose of this qualitative exploratory study is to explore the policies cybersecurity strategists to combat non-state actors in the cyber-domain of U.S. military warfare. The research question driving this study was: What are the policies a cybersecurity strategist needs to combat non-state actors in the cyber-domain of military warfare? This qualitative exploratory study used a semistructured interview with open-ended questioning of 10 participants who were all military service members deployed to Iraq or Afghanistan since the September 11th, 2001 terrorist attacks and served in an information technology capacity during such a deployment. Four themes emerged from the interviews including: The themes were: combination strategy, ethical high-ground, actionable intelligence, and attribution. Theme 1 concerned the adoption of an overall strategy that at a minimum combined the approaches of offense, defense, intelligence, and deterrence as an overall strategy of the U.S. military in the cyber-domain of warfare against non-state actors. Theme 2 concerned the ethical standing that should be taken when combating non-state actors that do not follow laws or policies in cyber-warfare. Theme 3 articulated the need for intelligence that can help to drive operations in the cyber-domain. Theme 4 demonstrated the concern of being able to attribute an actor with an act of aggression in the cyber-domain of military warfare. The study provides a direction which cybersecurity strategists and military professionals alike can utilize to move forward and develop the operational aspects that fall into a combination strategy. Keywords: cyber-domain, cyber-warfare, non-state actors, attribution.
ISBN: 9781392009857Subjects--Topical Terms:
1030799
Information Technology.
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
LDR
:02851nmm a2200337 4500
001
2209045
005
20191025102640.5
008
201008s2019 ||||||||||||||||| ||eng d
020
$a
9781392009857
035
$a
(MiAaPQ)AAI13807364
035
$a
(MiAaPQ)ctu:10508
035
$a
AAI13807364
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Scalise, Benjamin F., III.
$3
3436124
245
1 0
$a
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
106 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-10, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Jordan, Lizabeth.
502
$a
Thesis (D.C.S.)--Colorado Technical University, 2019.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this qualitative exploratory study is to explore the policies cybersecurity strategists to combat non-state actors in the cyber-domain of U.S. military warfare. The research question driving this study was: What are the policies a cybersecurity strategist needs to combat non-state actors in the cyber-domain of military warfare? This qualitative exploratory study used a semistructured interview with open-ended questioning of 10 participants who were all military service members deployed to Iraq or Afghanistan since the September 11th, 2001 terrorist attacks and served in an information technology capacity during such a deployment. Four themes emerged from the interviews including: The themes were: combination strategy, ethical high-ground, actionable intelligence, and attribution. Theme 1 concerned the adoption of an overall strategy that at a minimum combined the approaches of offense, defense, intelligence, and deterrence as an overall strategy of the U.S. military in the cyber-domain of warfare against non-state actors. Theme 2 concerned the ethical standing that should be taken when combating non-state actors that do not follow laws or policies in cyber-warfare. Theme 3 articulated the need for intelligence that can help to drive operations in the cyber-domain. Theme 4 demonstrated the concern of being able to attribute an actor with an act of aggression in the cyber-domain of military warfare. The study provides a direction which cybersecurity strategists and military professionals alike can utilize to move forward and develop the operational aspects that fall into a combination strategy. Keywords: cyber-domain, cyber-warfare, non-state actors, attribution.
590
$a
School code: 1271.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Military studies.
$3
2197382
650
4
$a
Computer science.
$3
523869
690
$a
0489
690
$a
0750
690
$a
0984
710
2
$a
Colorado Technical University.
$b
Computer Science.
$3
3342445
773
0
$t
Dissertations Abstracts International
$g
80-10B.
790
$a
1271
791
$a
D.C.S.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13807364
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9385594
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login