Back to Search
ISBN 9781076743633 is currently unpriced. Please contact us for pricing.
Available options are listed below:

Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

AUTHOR Manjikian, Mary; The United States Army War College Press; Strategic Studies Institute
PUBLISHER Independently Published (06/27/2019)
PRODUCT TYPE Paperback (Paperback)

Description
Perhaps the best starting point for those looking to "borrow" a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence-due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy-among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America's borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
Show More
Product Format
Product Details
ISBN-13: 9781076743633
ISBN-10: 1076743633
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 82
Carton Quantity: 86
Product Dimensions: 6.00 x 0.20 x 9.00 inches
Weight: 0.29 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | Internet - Online Safety & Privacy
Computers | General
Computers | International Relations - General
Grade Level: College Freshman - 5th Grade
Descriptions, Reviews, Etc.
publisher marketing
Perhaps the best starting point for those looking to "borrow" a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence-due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy-among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America's borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
Show More
Paperback