National Security in the Information Age
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant.
These essays examine the ways in which the information technology revolution has affected the logic of deterrence and crisis management, definitions of peace and war, democratic constraints on conflict, the conduct of and military organization for war, and the growing role of the private sector in providing security.
Hva folk mener - Skriv en omtale
Vi har ikke funnet noen omtaler på noen av de vanlige stedene.
A Strategic Response to Anonymity and the Problem of the Few
Information Technology and Crisis Management
International Competition and Information TechnologyDriven Military Organizations
The Strategy and Tactics of Information Warfare
Information Warfare and Democratic Accountability
Information Warfare and Domestic Threats to American Security
Andre utgaver - Vis alle
11 September ability action activity actors adversary adversary's Afghanistan Al Qaeda American analysis Atrium attack Berlin Berlin Blockade Bruce Schneier capabilities challenge civil liberties Cold War combat command communications complex concept conflict crises crisis management cyber insurance cyberspace cyberwar decision defence Demchak democratic destruction deterrence disruption domestic effective electronic enemy example forces foreign function global goal groups Harknett implications incentives individual information age information systems information technology information technology network information warfare infrastructure integrated intelligence involved John Arquilla knowledge Kosovo lethal Matt Bishop monitoring national security NATO non-state nuclear operations organizational perception management physical political potential private sector problem protect proxies requires response revolution risk senior leaders society Soviet Soviet Union strategy structure surprise surveillance target technical terrorism terrorist threat United University Press USA Patriot Act vulnerabilities Washington weapons York