A response paper on the readings below
Who Does What, When (and Why)?
Chaudhary, T., Jordan, J., Salomone, M., Baxter, P., 2018. Patchwork of confusion: the cybersecurity coordination problem. Journal of Cybersecurity 4. https://doi.org/10.1093/cybsec/tyy005Links to an external site.
Grant, T., 2015. On the military geography of cyberspace.
Leading Issues in Cyber Warfare and Security: Cyber Warfare Secur, 2, p.119. https://www.researchgate.net/profile/Tim-Grant-9/publication/290601359_On_the_military_geography_of_cyberspace/links/5858583508ae64cb3d47eafb/On-the-military-geography-of-cyberspace.pdfLinks to an external site.
Jurgens, Jeremy. Global Cybersecurity Outlook 2022. World Economic Forum in Collaboration with Accenture, January 2022. www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf
Lin, Herbert. Attribution of Malicious Cyber Incidents: From Soup to Nuts. Hoover Institution. Aegis Paper Series, No. 1607. https://www.hoover.org/sites/default/files/research/docs/lin_webready.pdfLinks to an external site.





Recent Comments