LEADER 03229nam 2200613 450 001 9910819814403321 005 20230124193614.0 010 $a0-8203-4919-4 035 $a(CKB)3710000000633009 035 $a(EBL)4471218 035 $a(SSID)ssj0001647007 035 $a(PQKBManifestationID)16417188 035 $a(PQKBTitleCode)TC0001647007 035 $a(PQKBWorkID)14828603 035 $a(PQKB)10098042 035 $a(MiAaPQ)EBC4471218 035 $a(OCoLC)946106119 035 $a(MdBmJHUP)muse53024 035 $a(Au-PeEL)EBL4471218 035 $a(CaPaEBR)ebr11206803 035 $a(CaONFJC)MIL909496 035 $a(OCoLC)946312777 035 $a(EXLCZ)993710000000633009 100 $a20150904d2016 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe decision to attack $emilitary and intelligence cyber decision-making /$fAaron Franklin Brantly 210 1$aAthens, Georgia :$cUniversity of Georgia Press,$d[2016] 215 $a1 online resource (245 p.) 225 1 $aStudies in security and international affairs 300 $aDescription based upon print version of record. 311 $a0-8203-4920-8 320 $aIncludes bibliographical references and index. 327 $aIntroduction to cyber decision-making -- The key concepts of cyber -- The motivation and utility for covert action -- Digital power -- Anonymity and attribution in cyberspace -- Cyber and conventional operations: the dynamics of conflict -- Defining the role of intelligence in cyberspace -- How actors decide to use cyber--a rational choice approach -- Cognitive processes and decision-making in cyberspace -- Finding meaning in the expected utility of international cyber conflict -- Appendix A. Power score components and scores -- Appendix B. Modified Economist Intelligence Unit component values -- Appendix C. Affinity scores. 330 $aThe debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain.

With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected u 410 0$aStudies in security and international affairs. 517 3 $aMilitary and intelligence cyber decision-making 606 $aCyberspace$xSecurity measures$xGovernment policy$zUnited States 606 $aOffensive (Military science) 607 $aUnited States$xMilitary policy$xDecision making 615 0$aCyberspace$xSecurity measures$xGovernment policy 615 0$aOffensive (Military science) 676 $a355.4/1 700 $aBrantly$b Aaron Franklin$0788423 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910819814403321 996 $aThe decision to attack$94055665 997 $aUNINA