Add to wishlist
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace.
Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace
Acknowledgments
Foreword by General Paul Nakasone
Chapter 1: The Misapplied Nexus of Theory and Policy
Chapter 2: The Structure of Strategic Environments
Chapter 3: Cyber Behavior and Dynamics
Chapter 4: Theory and the Empirical Record
Chapter 5: Cyber Stability
Chapter 6: The Cyber Aligned Nexus of Theory and Policy
Chapter 7: United States Case Study
Bibliography
Index
Description
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace.
Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace