Contents |
Key considerations -- The future of things cyber / MICHAEL V. HAYDEN -- What's wrong with cyberspace? / LYNN MATTICE -- Cyberspace superiority considerations / FRED TAYLOR, JR. AND JERRY CARTER -- Maybe three cheers for ambiguity / MARTIN C. LIBICKI -- The essentiaial features of an ontology for cyberwarfare / RANDALL R. DIPERT -- Cyber defense as environmental protection -- the broader potential impact of failed defensive counter cyber operations / JAN KALLBERG AND ROSEMARY A. BURK -- Technology -- Challenges in monitoring cyberarms compliance / NEIL C. ROWE, SIMSON L. GARFINKEL, ROBERT BEVERLY, AND PANAYOTIS A. YANNAKOGEORGOS -- Digital policy management: a foundation for tomorrow / NATIONAL SECURITY AGENCY (NSA), ENTERPRISE SERVICES DIVISION, IDENTITY AND ACCESS MANAGEMENT BRANCH -- On mission assurance / KAMAL JABBOUR AND SARAH MUCCIO -- Stuxnet: a case study in cyber warfare / ERIC P. OLIVER -- The Internet and dissent in authoritariaian states / JAMES D. FIELDER -- Ethics, law, and policy -- Can there be an ethical cyber war? / GEORGE R LUCAS, JR -- Perspectives for cyberstrategists on cyberlaw for cyberwar / CHARLES J. DUNLAP, JR -- A new normal? the cultivation of global norms as part of a cybersecurity strategy / ROGER HURWITZ -- The prospects for cyber deterrence: american sponsorshipip of global norms / PANAYOTIS A. YANNAKOGEORGOS AND ADAM B. LOWTHER -- Cyber sovereignty / STEPHEN K. GOURLEY -- American cybersecurity triad: governmentwide integration, technological counterintelligence, and educational mobilization / SUNGHYUN KIM. |