LEADER 03988nam 22006015 450 001 9910828156803321 005 20240131154643.0 010 $a0-300-22629-2 024 7 $a10.12987/9780300226294 035 $a(CKB)4340000000195860 035 $a(MiAaPQ)EBC4987810 035 $a(DE-B1597)493874 035 $a(OCoLC)1083624484 035 $a(DE-B1597)9780300226294 035 $a(PPN)250807912 035 $a(EXLCZ)994340000000195860 100 $a20190920d2019 fg 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe Virtual Weapon and International Order 210 1$aNew Haven, CT $cYale University Press$d2019 215 $a1 online resource (333 pages) 300 $aGOBI 320 $aIncludes bibliographical references and index. 327 $tFrontmatter --$tContents --$tTables --$tAcknowledgments --$tIntroduction --$tPART I. THEORY AND CONCEPTS --$tCHAPTER 1. The Quest for Cyber Theory --$tCHAPTER 2. The Cyber Curse: COMPLICATIONS OF DEFENSE --$tCHAPTER 3. Technological Revolution and International Order --$tPART II. DEGREES OF THE CYBER REVOLUTION --$tCHAPTER 4. Third-Order Cyber Revolution: PROBLEMS OF INADVERTENT CONFLICT --$tCHAPTER 5. Second-Order Cyber Revolution: THE PROBLEM OF THE REVOLUTIONARY STATE --$tCHAPTER 6. First-Order Cyber Revolution: PRESSURES FROM OUTSIDE THE STATES SYSTEM --$tPART III. PROBLEMS OF STRATEGY AND POLICY --$tCHAPTER 7. The Deterrence Puzzle: DOCTRINAL PROBLEMS AND REMEDIES --$tCHAPTER 8. Russia and Cyberspace: MANIFESTATIONS OF THE REVOLUTION --$tCHAPTER 9. Private Sector Active Defense: AN ADEQUATE RESPONSE TO THE SOVEREIGNTY GAP? --$tCHAPTER 10. Cyber Futures --$tNotes --$tBibliography --$tIndex 330 $aAn urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order The cyber revolution is the revolution of our time. The rapid expansion of cyberspace brings both promise and peril. It promotes new modes of political interaction, but it also disrupts interstate dealings and empowers non-state actors who may instigate diplomatic and military crises. Despite significant experience with cyber phenomena, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy. Kello draws on a broad range of case studies, including the Estonian crisis, the Olympic Games operation against Iran, and the cyber attack against Sony Pictures. Synthesizing qualitative data from government documents, forensic reports of major incidents and interviews with senior officials from around the globe, this important work establishes new conceptual benchmarks to help security experts adapt strategy and policy to the unprecedented challenges of our times. 606 $aCyberspace operations (Military science)$2FBC 606 $aCyberspace$xSecurity measures$2FBC 606 $aCyberspace$xGovernment policy$2FBC 606 $aSecurity, International 606 $aInternational sikkerhed$2FBC 606 $aCybersikkerhed$2FBC 606 $aMilitærvidenskab$2FBC 615 7$aCyberspace operations (Military science) 615 7$aCyberspace$xSecurity measures. 615 7$aCyberspace$xGovernment policy. 615 0$aSecurity, International. 615 7$aInternational sikkerhed 615 7$aCybersikkerhed 615 7$aMilitærvidenskab 676 $a355.4 686 $a355.4$2z 700 $aKello$b Lucas, $4aut$4http://id.loc.gov/vocabulary/relators/aut$01518358 701 $aKello$bLucas$01518358 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a9910828156803321 996 $aThe Virtual Weapon and International Order$93960440 997 $aUNINA