LEADER 03263nam 2200625 450
001 9910466119103321
005 20200520144314.0
010 $a0-8203-4919-4
035 $a(CKB)3710000000633009
035 $a(EBL)4471218
035 $a(SSID)ssj0001647007
035 $a(PQKBManifestationID)16417188
035 $a(PQKBTitleCode)TC0001647007
035 $a(PQKBWorkID)14828603
035 $a(PQKB)10098042
035 $a(MiAaPQ)EBC4471218
035 $a(OCoLC)946106119
035 $a(MdBmJHUP)muse53024
035 $a(Au-PeEL)EBL4471218
035 $a(CaPaEBR)ebr11206803
035 $a(CaONFJC)MIL909496
035 $a(OCoLC)946312777
035 $a(EXLCZ)993710000000633009
100 $a20150904d2016 uy| 0
101 0 $aeng
135 $aur|n|---|||||
181 $ctxt
182 $cc
183 $acr
200 14$aThe decision to attack $emilitary and intelligence cyber decision-making /$fAaron Franklin Brantly
210 1$aAthens, Georgia :$cUniversity of Georgia Press,$d[2016]
215 $a1 online resource (245 p.)
225 1 $aStudies in security and international affairs
300 $aDescription based upon print version of record.
311 $a0-8203-4920-8
320 $aIncludes bibliographical references and index.
327 $aIntroduction to cyber decision-making -- The key concepts of cyber -- The motivation and utility for covert action -- Digital power -- Anonymity and attribution in cyberspace -- Cyber and conventional operations: the dynamics of conflict -- Defining the role of intelligence in cyberspace -- How actors decide to use cyber--a rational choice approach -- Cognitive processes and decision-making in cyberspace -- Finding meaning in the expected utility of international cyber conflict -- Appendix A. Power score components and scores -- Appendix B. Modified Economist Intelligence Unit component values -- Appendix C. Affinity scores.
330 $aThe debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain.
With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected u
410 0$aStudies in security and international affairs.
517 3 $aMilitary and intelligence cyber decision-making
606 $aCyberspace$xSecurity measures$xGovernment policy$zUnited States
606 $aOffensive (Military science)
607 $aUnited States$xMilitary policy$xDecision making
608 $aElectronic books.
615 0$aCyberspace$xSecurity measures$xGovernment policy
615 0$aOffensive (Military science)
676 $a355.4/1
700 $aBrantly$b Aaron Franklin$0917214
801 0$bMiAaPQ
801 1$bMiAaPQ
801 2$bMiAaPQ
906 $aBOOK
912 $a9910466119103321
996 $aThe decision to attack$92056272
997 $aUNINA