|
|
|
|
LEADER |
00000cam a22000004a 4500 |
001 |
musev2_45365 |
003 |
MdBmJHUP |
005 |
20230905044737.0 |
006 |
m o d |
007 |
cr||||||||nn|n |
008 |
160411s2016 gau o 00 0 eng d |
020 |
|
|
|a 9780820349190
|
020 |
|
|
|z 9780820349206
|
035 |
|
|
|a (OCoLC)946106119
|
040 |
|
|
|a MdBmJHUP
|c MdBmJHUP
|
100 |
1 |
|
|a Brantly, Aaron Franklin,
|e author.
|
245 |
1 |
4 |
|a The Decision to Attack :
|b Military and Intelligence Cyber Decision-Making /
|c Aaron Franklin Brantly.
|
264 |
|
1 |
|a Athens :
|b The University of Georgia Press,
|c [2016]
|
264 |
|
3 |
|a Baltimore, Md. :
|b Project MUSE,
|c 2016
|
264 |
|
4 |
|c ©[2016]
|
300 |
|
|
|a 1 online resource (248 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Studies in security and international affairs
|
505 |
0 |
|
|a Introduction to cyber decision-making -- The key concepts of cyber -- The motivation and utility for covert action -- Digital power -- Anonymity and attribution in cyberspace -- Cyber and conventional operations: the dynamics of conflict -- Defining the role of intelligence in cyberspace -- How actors decide to use cyber -- a rational choice approach -- Cognitive processes and decision-making in cyberspace -- Finding meaning in the expected utility of international cyber conflict -- Appendix A. Power score components and scores -- Appendix B. Modified Economist Intelligence Unit component values -- Appendix C. Affinity scores.
|
520 |
|
|
|a The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected u.
|
546 |
|
|
|a English.
|
588 |
|
|
|a Description based on print version record.
|
650 |
|
7 |
|a Offensive (Military science)
|2 fast
|0 (OCoLC)fst01044040
|
650 |
|
7 |
|a Military policy
|x Decision making.
|2 fast
|0 (OCoLC)fst01021388
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Military Science.
|2 bisacsh
|
650 |
|
7 |
|a HISTORY
|x Military
|x Other.
|2 bisacsh
|
650 |
|
6 |
|a Attaque (Science militaire)
|
650 |
|
0 |
|a Offensive (Military science)
|
650 |
|
0 |
|a Cyberspace
|x Security measures
|x Government policy
|z United States.
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
651 |
|
0 |
|a United States
|x Military policy
|x Decision making.
|
655 |
|
7 |
|a Electronic books.
|2 local
|
710 |
2 |
|
|a Project Muse.
|e distributor
|
830 |
|
0 |
|a Book collections on Project MUSE.
|
856 |
4 |
0 |
|z Texto completo
|u https://projectmuse.uam.elogim.com/book/45365/
|
945 |
|
|
|a Project MUSE - Custom Collection
|
945 |
|
|
|a Project MUSE - 2016 Complete
|
945 |
|
|
|a Project MUSE - 2016 Political Science and Policy Studies
|