Cargando…

Cashing in on cyberpower : how interdependent actors seek economic outcomes in a digital world /

As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enable actors to change actual economic outcomes without the massive resource investment required for military force deploy...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Peters, Mark T., II (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Lincoln, Nebraska] : Potomac Books, an imprint of the University of Nebraska Press, [2018]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_on1029352671
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |||||||||||
008 180323s2018 nbu ob 001 0 eng d
010 |a  2017052149 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDX  |d P@U  |d JSTOR  |d OCLCF  |d INT  |d OCLCQ  |d UX1  |d OCLCQ  |d HF9  |d IBI  |d OCLCO  |d OCLCQ 
019 |a 1158038797  |a 1175638698 
020 |a 9781640120518  |q (electronic book) 
020 |a 1640120513  |q (electronic book) 
020 |a 9781640120532  |q (electronic book) 
020 |a 164012053X  |q (electronic book) 
020 |a 9781640120525  |q (electronic book) 
020 |a 1640120521  |q (electronic book) 
020 |z 9781640120136  |q (hardcover) 
020 |z 1640120130  |q (hardcover) 
029 1 |a AU@  |b 000062214562 
035 |a (OCoLC)1029352671  |z (OCoLC)1158038797  |z (OCoLC)1175638698 
037 |a 22573/ctt225b0st  |b JSTOR 
050 4 |a U167.5.C92  |b P47 2018eb 
072 7 |a SOC  |x 004000  |2 bisacsh 
072 7 |a BUS  |x 069020  |2 bisacsh 
072 7 |a POL  |x 011000  |2 bisacsh 
082 0 4 |a 364.16/8  |2 23 
049 |a UAMI 
100 1 |a Peters, Mark T.,  |c II,  |e author. 
245 1 0 |a Cashing in on cyberpower :  |b how interdependent actors seek economic outcomes in a digital world /  |c Mark T. Peters II. 
264 1 |a [Lincoln, Nebraska] :  |b Potomac Books, an imprint of the University of Nebraska Press,  |c [2018] 
300 |a 1 online resource (xii, 268 pages} 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references (pages 239-253) and index. 
505 0 |a 1. Entering the Cyber Commons -- Problem -- Research Question -- Interdependence and Power -- Method Development -- Cyber Application and Case Studies -- Summary -- 2. Interdependence -- Why Use Interdependence Theory? -- Interdependent Characteristics of the Virtual State -- Defining Interdependent Cyberspace -- Cyber Operations -- Summary -- 3. Power -- Types of Power -- Power Application -- Power through Economic Cyber Influences -- Summary -- 4. Method Development -- Method Types -- Describing the Data Sources -- Categorizing Cyber Events -- Case Study Guideline -- Summary -- 5. Cyber Applications -- Application in Practice -- Deciphering the Data -- Evaluating the First Four Hypotheses -- Summary 6. Case Study Analysis -- Deciphering Events through Narrative Linkages -- Japanese Government Case: Economic Espionage -- Ukrainian Power Grid Case: Economic Cyberattack -- Codan Case: Intellectual Property Theft -- Evaluating the Economic Hypotheses (H5, H6, H7, H8) -- Summary -- 7. Framing Future Channels -- Linking Hypotheses to the Research Question -- Future Applications -- Final Thoughts -- Appendix: Cyber Events 
520 |a As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enable actors to change actual economic outcomes without the massive resource investment required for military force deployments. Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values. Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes. -- Provided by publisher. 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Cyberspace operations (Military science) 
650 0 |a Cyberterrorism  |x Political aspects. 
650 0 |a Balance of power  |x Economic aspects. 
650 6 |a Cyberguerre (Science militaire) 
650 6 |a Cyberterrorisme  |x Aspect politique. 
650 6 |a Équilibre des puissances  |x Aspect économique. 
650 7 |a SOCIAL SCIENCE  |x Criminology.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x International  |x Economics.  |2 bisacsh 
650 7 |a Cyberspace operations (Military science)  |2 fast  |0 (OCoLC)fst01909446 
776 0 8 |i Print version:  |a Peters, Mark T., II.  |t Cashing in on cyberpower.  |d Lincoln : University of Nebraska Press, [2018]  |z 9781640120136  |w (DLC) 2017052149  |w (OCoLC)1012715659 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt22726v0  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 1737410 
938 |a Project MUSE  |b MUSE  |n muse65923 
938 |a YBP Library Services  |b YANK  |n 15042205 
938 |a YBP Library Services  |b YANK  |n 15237148 
994 |a 92  |b IZTAP