Киберсдерживание и цифровая дилемма безопасности в американском экспертном дискурсе

Научная критика американской концепции "киберсдерживания" путём рассмотрения её в контексте особенностей цифровой "дилеммы безопасности". Принципиальные отличия сдерживания в киберпространстве от сдерживания в любой другой сфере международных отношений.

Рубрика Международные отношения и мировая экономика
Вид статья
Язык русский
Дата добавления 26.03.2021
Размер файла 47,3 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Borghard E.D., Lonergan S.W. (2016). Can States Calculate the Risks of Using Cyber Proxies? Orbis. No. 3. P. 395-416.

Brantly A. (2018). Conceptualizing Cyber Deterrence by Entanglement. URL: http://dx.doi.org/10.2139/ ssrn.2624926

Brantly A. F. (2018). The Cyber Deterrence Problem. 10th International Conference on Cyber Conflict (CyCon). IEEE. P. 31-54.

Brenner J. (2014). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. NY: Penguin Press. 320 p.

Buchanan B. (2016). The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations. Oxford University Press, 2016. 304 p.

Cavelty M.D. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics. No. 3. P. 701-715.

Clarke R.A., Knake R.K. (2014). Cyber War. Tantor Media, Incorporated. 136 p.

Cooper J. R. (2012). A New Framework for Cyber Deterrence. In Reveron D.S. (ed.) Cyberspace and National Security Threats, Opportunities, and Power in a Virtual World. Washington: Georgetown University Press. P. 105-120.

Craig A., Valeriano B. (2016). Conceptualising Cyber Arms Races. 8th International Conference on Cyber Conflict (CyCon). IEEE. P. 141-158. URL: https://ccdcoe.org/uploads/2018/10/Art-10-Conceptualising- Cyber-Arms-Races.pdf

Deibert R. (2015). Trajectories for Future Cybersecurity Research. In Gheciu A., Wohlforth W.C. (eds) The Oxford Handbook of International Security. Oxford: Oxford University Perss, 2015. P. 531-556.

Demidov O., Simonenko M. (2013). Pozhar v kiberprostranstve [Cyberspace on Fire]. Indeks bezopasnosti. No. 1. P. 229-232.

Finnemore M. (2019). Talking Past Each Other: Government, Business and Civil Society Discussing Cyber Security. Vestnik MGIMO-Universiteta. Vol. 12. No. 5. P. 7-11.

Finnemore M., Hollis D.B. (2016). Constructing Norms for Global Cybersecurity. American Journal of International Law. Vol. 110. No. 3. P. 425-479.

Gaver W.W. (1991). TechnologyAffordances. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM. P. 79-84.

Glaser C.L. (2011). Deterrence of Cyber Attacks and US National Security. Developing Cyber Security Synergy. Vol. 47. URL: http://www.offnews.info/downloads/2011-5CyberDeterrenceGlaser.pdf

Healey J. (ed.) (2013). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association. 356 p.

Herz J. H. (1950). Idealist internationalism and the security dilemma. World politics. Vol. 2. No. 2. P. 157-180.

Istomin I. (2012). Nauchnoe obespechenie vneshnej politiki SShA. [Scientific support of the US foreign policy]. PhD Dissertation. Political Sciences.

Jervis R. (1978). Cooperation under the Security Dilemma. World Politics. Vol. 30. No. 2. P. 167-214.

Jervis R. (1989a). Rational Deterrence: Theory and Evidence. World Politics. Vol. 41. No. 2. P. 183-207.

Jervis R. (2016). Some Thoughts on Deterrence in the Cyber Era. Journal of Information Warfare. Vol. 15. No. 2. P. 66-73.

Jervis, R. (1989b). The meaning of the nuclear revolution: Statecraft and the prospect of Armageddon. Cornell University Press. 266 p.

Kello L. (2017). The Virtual Weapon and International Order. New Heaven and London: Yale University Press. 319 p.

Korotkov A.V., Zinovieva E.S. (2011). Bezopasnost' kriticheskih informacionnyh infrastruktur v mezhdunarodnom gumanitarnom prave [Critical Information Infrastructures Security in the International Humanitarian Law]. Vestnik MGIMO--Universiteta. No. 4. P. 154--162.

Kugler R.L. (2009). Deterrence of Cyber Attacks and US National Security. In Kramer F., Starr S.,
Wentz L. (eds) Cyberpower and National Security. Washington DC: Potomac Books. P. 309--342.

Lewis J., Timlin K. (2011). Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization, UNIDIR. URL: http://unidir.org/files/publications/pdfs/cybersecurity-and-cyberwarfare- preliminary-assessment-of-national-doctrine-and-organization-380.pdf

Libicki M. (2009). Cyberdeterrence and Cyberwar. Rand Corporation. 214 p.

Libicki M. (2016). Cyberspace in Peace and War. Naval Institute Press. 478 p.

Libicki M. (2018). Expectations of Cyber Deterrence. Strategic Studies Quarterly. No. 4. P.44--57.

Lieber K.A. (2005). War and the engineers: The primacy of politics over technology. Cornell University Press. 226 p.

Lindsay J. 2013. Stuxnet and the Limits of Cyber Warfare. Security Studies. No. 3. P. 36--404.

Lukasik S.J. (2010). A Framework for Thinking About Cyber Conflict and Cyber Deterrence with Possible Declaratory Policies for These Domains. Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for US Policy. Vol. 2. P. 99--122.

Majchrzak A., Markus M.L. (2012). Technology Affordances and Constraints in Management Information Systems (MIS). In Kessler E. (ed.) Encyclopedia of Management Theory. London: Sage. URL: https:// ssrn.com/abstract=2192196

Maness R., Valeriano B. (2016). The Impact of Cyber Conflict on International Interactions. Armed Forces & Society. Vol. 42. No. 2. P. 301-323.

Manjikian M. (2010). From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik. International Studies Quarterly. No. 2. Р. 381-401.

Mazarr M., Bauer R., Casey A., Heintz S., Matthews L. (2019). The Emerging Risk of Virtual Societal Warfare. Santa Monica, CA: RAND Corporation. URL: https://www.rand.org/pubs/research_reports/ RR2714.html

Mearsheimer J.J. (1985). Conventional Deterrence. Ithaca: Cornell University Press. 296 p.

Morozov E. (2012). The Net Delusion: The Dark Side of Internet Freedom. Public Affairs. 429 p.

Nye J.S. (2011). The Future of Power. Public Affairs. 300 p.

Nye J.S. (2017). Deterrence and Dissuasion in Cyberspace. International Security. Vol. 41. No. 3. P. 44-71.

Panarin I.N. (2006). Informatsionnaya vojna i geopolitika [Information Warfare and Geopolititcs]. Moscow: Pokolenie. 560 p.

Rauscher K. F., Yaschenko V. (2011). Russia-US bilateral on cybersecurity: Critical terminology foundations. New York, USA: EastWest Institute. 48 p.

Reich P.C. et al. (2010). Cyber Warfare: a Review of Theories, Law, Policies, Actual Incidents -- and the Dilemma of Anonymity. European Journal of Law and Technology. Vol. 1. No. 2. P. 1--58.

Rid T., Buchanan B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies. Vol. 38. No. 1--2. P. 4-37.

Rogovskij E.A. (2014). Kiber-Vashington: global'nye ambitsii [Cyber-Washington: Global Ambitions]. Moscow: Mezhdunarodnye otnoshenija. 848 p.

Schelling, T. C. (1966). Arms and influence. New Haven, CT: Yale University Press.

Schmitt M.N. (ed.) (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. (2013). Cambridge University Press. 281 p.

Schmitt M.N. (ed.) (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. (2017). Cambridge University Press. 597 p.

Shakleina T.A. (2015). Liderstvo i sovremennyj mirovoj porjadok [Leadership in the Contemporary International Order]. Mezhdunarodnye protsessy. No. 4. P. 6-19.

Stevens T. (2012). A Cyberwar of Ideas? Deterrence and Norms in Cyberspace. Contemporary Security Policy. Vol. 33. No. 1. P. 148-170.

Tor U. (2017). “Cumulative Deterrence” as a New Paradigm for Cyber Deterrence. Journal of Strategic Studies. Vol. 40. No. 1-2. P. 92-117.

Valeriano B., Maness R. (2018). International Relations Theory and Cyber Security: Threats, Conflicts and Ethics in an Emergent Domain. In Brown C., Eckersley R. (eds) The Oxford Handbook of Political Theory. Oxford: Oxford University Press. P. 259-275.

Wilner A. (2019). US Cyber Deterrence: Practice Guiding Theory. Journal of Strategic Studies. P. 1-36.

Zetter K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. NY: Crown Publishers. 449 p.

Размещено на Allbest.ru

...

Подобные документы

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.