Over the years, experts–both in and outside of the military–have repeatedlystated that we need to improve our conceptual and doctrinal thinking when itcomes to military cyber operations and how to address the cyber threat. Thepurpose of this chapter is to discuss the nature and role of military cyberoperations. The chapter proceeds in six parts. Part one provides a glimpse at theevolving scholarly study of cyber operations. Part two conceptualizes militarycyber operations in the present and explains the different forms of operations andoperational processes. Part three examines the distinct features of cyber opera-tions and how these features differ from or are similar to more conventionalmilitary operations. Part four, in turn, explains to what degree cyber operationscan be used as a tool of coercion. Partfive examines the potential for conflict escalation in cyberspace and beyond. The chapter concludes with a brief discus-sion drawing together the disparate themes introduced.
CITATION STYLE
Brantly, A., & Smeets, M. (2020). Military Operations in Cyberspace. In Handbook of Military Sciences (pp. 1–16). Springer International Publishing. https://doi.org/10.1007/978-3-030-02866-4_19-1
Mendeley helps you to discover research relevant for your work.