Cyber Armies: The Unseen Military in the Grid
Salvato in:
| Pubblicato in: | International Conference on Cyber Warfare and Security (2015), p. 20-30 |
|---|---|
| Autore principale: | |
| Altri autori: | , |
| Pubblicazione: |
Academic Conferences International Limited
|
| Soggetti: | |
| Accesso online: | Citation/Abstract Full Text Full Text - PDF |
| Tags: |
Nessun Tag, puoi essere il primo ad aggiungerne!!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 1781336023 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 1781336023 | ||
| 045 | 2 | |b d20150101 |b d20151231 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Aschmann, Michael | |
| 245 | 1 | |a Cyber Armies: The Unseen Military in the Grid | |
| 260 | |b Academic Conferences International Limited |c 2015 | ||
| 513 | |a Feature | ||
| 520 | 3 | |a Information in the Global Digital Industrial Economic Age is viewed as a strategic resource. This article focus on the establishment of cyber armies within the World Wide Web, commonly known as the Grid, with the emphases on an unseen military cyber power and/or civilian force within the cyber domain that has the ability to launch cyber-attacks and collect information in order to gain strategic military advantage on a national level. Selected cyber armies are compared to portray the impact of such armies on the citizen. The article also gives a view of a proposed generic structure for cyber in the military to defend and protect the cyber sovereignty and presents a proposed view on how a cyber army can be integrated within a military force. In addition, the article highlights the strategic benefits and strategic advantage to the military and will give a military perspective on the implementation of a cyber army as a proposed model. | |
| 653 | |a Research & development--R&D | ||
| 653 | |a Armed forces | ||
| 653 | |a Politics | ||
| 653 | |a Sovereignty | ||
| 653 | |a Information warfare | ||
| 653 | |a Internet | ||
| 653 | |a Information systems | ||
| 653 | |a Army | ||
| 653 | |a Military strategy | ||
| 700 | 1 | |a van Vuuren, Joey Jansen | |
| 700 | 1 | |a Leenen, Louise | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (2015), p. 20-30 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/1781336023/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/1781336023/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/1781336023/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |