語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Exploring the Policies, Cybersecurit...
~
Scalise, Benjamin F., III.
FindBook
Google Book
Amazon
博客來
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare./
作者:
Scalise, Benjamin F., III.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
面頁冊數:
106 p.
附註:
Source: Dissertations Abstracts International, Volume: 80-10, Section: B.
Contained By:
Dissertations Abstracts International80-10B.
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13807364
ISBN:
9781392009857
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
Scalise, Benjamin F., III.
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 106 p.
Source: Dissertations Abstracts International, Volume: 80-10, Section: B.
Thesis (D.C.S.)--Colorado Technical University, 2019.
This item must not be sold to any third party vendors.
The purpose of this qualitative exploratory study is to explore the policies cybersecurity strategists to combat non-state actors in the cyber-domain of U.S. military warfare. The research question driving this study was: What are the policies a cybersecurity strategist needs to combat non-state actors in the cyber-domain of military warfare? This qualitative exploratory study used a semistructured interview with open-ended questioning of 10 participants who were all military service members deployed to Iraq or Afghanistan since the September 11th, 2001 terrorist attacks and served in an information technology capacity during such a deployment. Four themes emerged from the interviews including: The themes were: combination strategy, ethical high-ground, actionable intelligence, and attribution. Theme 1 concerned the adoption of an overall strategy that at a minimum combined the approaches of offense, defense, intelligence, and deterrence as an overall strategy of the U.S. military in the cyber-domain of warfare against non-state actors. Theme 2 concerned the ethical standing that should be taken when combating non-state actors that do not follow laws or policies in cyber-warfare. Theme 3 articulated the need for intelligence that can help to drive operations in the cyber-domain. Theme 4 demonstrated the concern of being able to attribute an actor with an act of aggression in the cyber-domain of military warfare. The study provides a direction which cybersecurity strategists and military professionals alike can utilize to move forward and develop the operational aspects that fall into a combination strategy. Keywords: cyber-domain, cyber-warfare, non-state actors, attribution.
ISBN: 9781392009857Subjects--Topical Terms:
1030799
Information Technology.
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
LDR
:02851nmm a2200337 4500
001
2209045
005
20191025102640.5
008
201008s2019 ||||||||||||||||| ||eng d
020
$a
9781392009857
035
$a
(MiAaPQ)AAI13807364
035
$a
(MiAaPQ)ctu:10508
035
$a
AAI13807364
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Scalise, Benjamin F., III.
$3
3436124
245
1 0
$a
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
106 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-10, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Jordan, Lizabeth.
502
$a
Thesis (D.C.S.)--Colorado Technical University, 2019.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this qualitative exploratory study is to explore the policies cybersecurity strategists to combat non-state actors in the cyber-domain of U.S. military warfare. The research question driving this study was: What are the policies a cybersecurity strategist needs to combat non-state actors in the cyber-domain of military warfare? This qualitative exploratory study used a semistructured interview with open-ended questioning of 10 participants who were all military service members deployed to Iraq or Afghanistan since the September 11th, 2001 terrorist attacks and served in an information technology capacity during such a deployment. Four themes emerged from the interviews including: The themes were: combination strategy, ethical high-ground, actionable intelligence, and attribution. Theme 1 concerned the adoption of an overall strategy that at a minimum combined the approaches of offense, defense, intelligence, and deterrence as an overall strategy of the U.S. military in the cyber-domain of warfare against non-state actors. Theme 2 concerned the ethical standing that should be taken when combating non-state actors that do not follow laws or policies in cyber-warfare. Theme 3 articulated the need for intelligence that can help to drive operations in the cyber-domain. Theme 4 demonstrated the concern of being able to attribute an actor with an act of aggression in the cyber-domain of military warfare. The study provides a direction which cybersecurity strategists and military professionals alike can utilize to move forward and develop the operational aspects that fall into a combination strategy. Keywords: cyber-domain, cyber-warfare, non-state actors, attribution.
590
$a
School code: 1271.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Military studies.
$3
2197382
650
4
$a
Computer science.
$3
523869
690
$a
0489
690
$a
0750
690
$a
0984
710
2
$a
Colorado Technical University.
$b
Computer Science.
$3
3342445
773
0
$t
Dissertations Abstracts International
$g
80-10B.
790
$a
1271
791
$a
D.C.S.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13807364
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9385594
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入