Crisis and Escalation in Cyberspace. (Record no. 112414)

000 -LEADER
fixed length control field 05582nam a22004933i 4500
001 - CONTROL NUMBER
control field EBC1365190
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20181121170806.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181113s2012 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780833076809
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9780833076786
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC1365190
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL1365190
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10818055
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)818866398
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163 -- .L518 2012eb
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 358.4/141
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Libicki, Martin C.
245 10 - TITLE STATEMENT
Title Crisis and Escalation in Cyberspace.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Santa Monica :
Name of publisher, distributor, etc RAND Corporation, The,
Date of publication, distribution, etc 2012.
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (153 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title Page -- Copyright -- Preface -- Contents -- Figures and Table -- Summary -- Acknowledgments -- Abbreviations -- CHAPTER ONE Introduction -- Some Hypothetical Crises -- Mutual Mistrust Is Likely to Characterize a Cybercrisis -- States May Have Room for Maneuver in a Cybercrisis -- A Note on Methodology -- Purpose and Organization -- CHAPTER TWO Avoiding Crises by Creating Norms -- What Kind of Norms Might Be Useful? -- Enforce Laws Against Hacking -- Dissociate from Freelance Hackers -- Discourage Commercial Espionage -- Be Careful About the Obligation to Suppress Cybertraffic -- How Do We Enforce Norms? -- Confidence-Building Measures -- Norms for Victims of Cyberattacks -- Norms for War -- Deception -- Military Necessity and Collateral Damage -- Proportionality -- Reversibility -- Conclusions -- CHAPTER THREE Narratives, Dialogue, and Signals -- Narratives to Promote Control -- A Narrative Framework for Cyberspace -- Victimization, Attribution, Retaliation, and Aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: Narratives to Walk Back a Crisis -- "We Did Nothing" -- "Well, At Least Not on Our Orders" -- "It Was an Accident" -- "This Is Nothing New" -- "At Least It Does Not Portend Anything" -- Broader Considerations -- Signals -- Ambiguity in Signaling -- Signaling Resolve -- Signaling That Cybercombat Is Not Kinetic Combat -- Conclusions -- CHAPTER FOUR Escalation Management -- Motives for Escalation -- Does Escalation Matter? -- Escalation Risks -- Escalation Risks in Phase 0 -- Escalation Risks for Contained Local Conflicts -- Escalation Risks for Uncontained Conflicts -- Managing Proxy Cyberattacks -- What Hidden Combatants Imply for Horizontal Escalation -- Managing Overt Proxy Conflict -- The Difficulties of Tit-for-Tat Management -- The Importance of Preplanning.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Disjunctions Among Effort, Effect, and Perception -- Inadvertent Escalation -- Escalation into Kinetic Warfare -- Escalation into Economic Warfare -- Sub-Rosa Escalation -- Managing the Third-Party Problem -- The Need for a Clean Shot -- Inference and Narrative -- Command and Control -- Commanders -- Those They Command -- Conclusions -- CHAPTER FIVE Implications for Strategic Stability -- Translating Sources of Cold War Instability to Cyberspace -- What Influence Can Cyberwar Have If Nuclear Weapons Exist? -- Can a Cyberattack Disarm a Target State's Nuclear Capabilities? -- Can a Cyberattack Disarm a Target State's Cyberwarriors? -- Does Cyberwar Lend Itself to Alert-Reaction Cycles? -- Are Cyberdefenses Inherently Destabilizing? -- Would a Cyberspace Arms Race Be Destabilizing? -- Surprise Attack as a Source of Instability -- Misperception as a Source of Crisis -- One Side Takes Great Exception to Cyberespionage -- Defenses Are Misinterpreted as Preparations for War -- Too Much Confidence in Attribution -- Too Much Confidence in or Fear of Preemption -- Supposedly Risk-Free Cyberattacks -- Neutrality -- Conclusions -- CHAPTER SIX Can Cybercrises Be Managed? -- APPENDIXES -- A. Distributed Denial-of-Service Attacks -- B. Overt, Obvious, and Covert Cyberattacks and Responses -- C. Can Good Cyberdefenses Discourage Attacks? -- Bibliography.
520 ## - SUMMARY, ETC.
Summary, etc The chances are growing that the United States will find itself in a crisis in cyberspace--the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for other states to step in, controlling the narrative, understanding the stability parameters of the crises, and recognizing escalation risks.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Crisis management -- Government policy -- United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberspace -- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism -- Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Escalation (Military science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare -- United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element United States. -- Air Force -- Decision making.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element United States. -- Air Force -- Organization.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Libicki, Martin C.
Title Crisis and Escalation in Cyberspace
Place, publisher, and date of publication Santa Monica : RAND Corporation, The,c2012
International Standard Book Number 9780833076786
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=1365190">https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=1365190</a>
Public note Click to View

No items available.

Powered by Koha