Military Operations in Cyberspace

  • Brantly A
  • Smeets M
N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Over the years, experts–both in and outside of the military–have repeatedlystated that we need to improve our conceptual and doctrinal thinking when itcomes to military cyber operations and how to address the cyber threat. Thepurpose of this chapter is to discuss the nature and role of military cyberoperations. The chapter proceeds in six parts. Part one provides a glimpse at theevolving scholarly study of cyber operations. Part two conceptualizes militarycyber operations in the present and explains the different forms of operations andoperational processes. Part three examines the distinct features of cyber opera-tions and how these features differ from or are similar to more conventionalmilitary operations. Part four, in turn, explains to what degree cyber operationscan be used as a tool of coercion. Partfive examines the potential for conflict escalation in cyberspace and beyond. The chapter concludes with a brief discus-sion drawing together the disparate themes introduced.

Cite

CITATION STYLE

APA

Brantly, A., & Smeets, M. (2020). Military Operations in Cyberspace. In Handbook of Military Sciences (pp. 1–16). Springer International Publishing. https://doi.org/10.1007/978-3-030-02866-4_19-1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free