| 000 | 01645nab a22001817a 4500 | ||
|---|---|---|---|
| 003 | ES-MaBCA | ||
| 005 | 20160201131913.0 | ||
| 008 | 120330t xxu||||| |||| 00| 0 eng d | ||
| 040 |
_aES-MaBCA _cES-MaBCA |
||
| 100 |
_92163 _aKlein, John J. |
||
| 245 |
_aDeterring and Dissuading Cyberterrorism _h[Recurso electrónico] PDF |
||
| 520 | _aCyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested. Some strategists and policy makers believe that acts of cyberterrorism, especially by non-state actors, may prove to be undeterrable. Yet the leadership of both state and non-state actors tend to act rationally and function strategically, and therefore they can, in fact, be deterred to some degree. Helping to shape the legitimate options following a significant cyberattack, the Law of Armed Conflict has salient considerations for the deterrence of cyberterrorism, particularly the principles of military necessity and lawful targeting. Furthermore, when considered holistically and using all available means, deterrence combined with dissuasion activities can lessen the likelihood of cyberterrorism, while mitigating any consequences should such a cyberattack actually occur. | ||
| 650 | 0 |
_91739 _aTerrorismo _xCiberterrorismo |
|
| 650 | 0 |
_91698 _aSeguridad en las Tecnologías |
|
| 773 | 0 |
_aJournal of Strategic Security _g. -- Vol 8 No. 4 (Winter 2015) Art. 2 _iEn : _tJournal of Strategic Security _w328 _x1944-0472 |
|
| 856 | 4 | _uhttp://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1460&context=jss | |
| 942 |
_2udc _cAN |
||
| 999 |
_c17528 _d17531 |
||