Cyber campaigns and strategic outcomes
While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory...
Saved in:
Published in | Journal of strategic studies Vol. 45; no. 4; pp. 534 - 567 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
London
Routledge
07.06.2022
Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory clever tactics, but strategic in intent. This article examines strategic cyber competition and reveals how the adoption of a different construct can pivot both explanation and policy prescription. Strategy must be unshackled from the presumption that it deals only with the realm of coercion, militarised crisis, and war in cyberspace. |
---|---|
AbstractList | While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory clever tactics, but strategic in intent. This article examines strategic cyber competition and reveals how the adoption of a different construct can pivot both explanation and policy prescription. Strategy must be unshackled from the presumption that it deals only with the realm of coercion, militarised crisis, and war in cyberspace. |
Author | Harknett, Richard J. Smeets, Max |
Author_xml | – sequence: 1 givenname: Richard J. surname: Harknett fullname: Harknett, Richard J. email: richard.harknett@uc.edu organization: University of Cincinnati – sequence: 2 givenname: Max surname: Smeets fullname: Smeets, Max |
BookMark | eNp9kEtLAzEUhYNUsFZ_gjAguJt685pkdkrxBQU3Cu5CJrlTpnSSmkyR_ns7tG5dXTh851z4LskkxICE3FCYU9BwD1QA4zXMGbBDpDjjUpyRKVWClzVXXxMyHZlyhC7IZc5rAKq15FNyt9g3mApn-63tViEXNvgiD8kOuOpcEXeDiz3mK3Le2k3G69Odkc_np4_Fa7l8f3lbPC5Lx7UcSqsb6xGkRt-gZBWipQ2vKPi2UsIqBa6unZJctw2zCqny4KHyHhRqKmo-I7fH3W2K3zvMg1nHXQqHl4ZVNdNKCD5S8ki5FHNO2Jpt6nqb9oaCGZWYPyVmVGJOSg69h2OvC21Mvf2JaePNYPebmNpkg-uy4f9P_AI6iWh1 |
CitedBy_id | crossref_primary_10_34020_2073_6495_2023_1_206_221 crossref_primary_10_1080_25741292_2022_2127551 crossref_primary_10_1109_ACCESS_2024_3378735 crossref_primary_10_1080_09662839_2022_2031991 crossref_primary_10_1080_14702436_2021_1994398 crossref_primary_10_1080_01402390_2024_2330074 crossref_primary_10_1016_j_ijcip_2024_100683 crossref_primary_10_1080_03050629_2024_2310014 crossref_primary_10_1093_cybsec_tyac005 crossref_primary_10_17150_2308_6203_2023_12_3__525_543 crossref_primary_10_1080_01402390_2022_2037656 crossref_primary_10_33179_bsv_99_svi_11_cmc_24_2_6 crossref_primary_10_61732_bj_v2i2_58 crossref_primary_10_1080_02684527_2020_1840746 crossref_primary_10_1080_19361610_2021_1872359 crossref_primary_10_1080_02684527_2023_2300933 crossref_primary_10_1080_01402390_2024_2320954 crossref_primary_10_2298_MEDJP2401055V crossref_primary_10_1080_01402390_2022_2104253 crossref_primary_10_1080_23738871_2021_2000628 crossref_primary_10_1080_01402390_2021_1895117 crossref_primary_10_1109_TTS_2023_3280356 crossref_primary_10_1093_jogss_ogab028 crossref_primary_10_1093_cybsec_tyab008 crossref_primary_10_1177_00223433231220264 crossref_primary_10_1515_peps_2020_0046 crossref_primary_10_1080_23738871_2022_2083976 crossref_primary_10_1080_01402390_2022_2117140 crossref_primary_10_1177_13540661221117051 crossref_primary_10_1080_09592318_2023_2233159 crossref_primary_10_1080_01402390_2023_2174106 crossref_primary_10_1111_puar_13493 crossref_primary_10_1080_13523260_2024_2365062 crossref_primary_10_1093_isr_viaa086 crossref_primary_10_1177_00223433231218178 |
Cites_doi | 10.1109/MC.2002.1106187 10.1080/01495939308402915 10.1007/s10676-005-4582-3 10.1162/ISEC_a_00267 10.1162/ISEC_a_00189 10.1016/j.tvjl.2010.05.029 10.1080/01402390.2012.730485 10.1177/0022343313518940 10.1080/09636412.2017.1306396 10.1080/01402390.2012.739561 10.1080/01402390.2011.608939 10.1080/09636412.2013.816122 10.1080/00396338.2011.555586 10.1080/10630732.2011.578411 10.1080/01402390.2012.663252 10.1111/j.1540-5842.2009.01103.x 10.23919/CYCON.2017.8240326 10.1080/14702436.2018.1508349 10.1002/9781119183440 10.1177/0967010611431079 10.1162/ISEC_a_00138 10.1162/isec_a_00337 10.3390/fi4030672 10.1080/01402390.2012.742013 10.1162/ISEC_a_00136 10.2307/j.ctt1trkjd1 10.1017/CBO9780511612183 10.1093/acprof:oso/9780190201265.003.0006 10.1017/9781316422724 10.1080/01436597.2013.802502 10.1080/13567888.2017.1335101 10.1080/01402390.2017.1288107 10.1093/acprof:oso/9780190204792.001.0001 10.23919/CYCON.2018.8405010 10.1080/18335330.2012.653198 10.1017/S0020818305050010 10.1162/016228803322427965 10.4324/9780203630174 10.1080/19445571.2011.636956 10.1109/MSP.2011.67 |
ContentType | Journal Article |
Copyright | 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. 2020 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. This work is licensed under the Creative Commons Attribution – Non-Commercial – No Derivatives License http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. 2020 – notice: 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. This work is licensed under the Creative Commons Attribution – Non-Commercial – No Derivatives License http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | 0YH AAYXX CITATION 7UB 8BJ FQK JBE |
DOI | 10.1080/01402390.2020.1732354 |
DatabaseName | Taylor & Francis Open Access CrossRef Worldwide Political Science Abstracts International Bibliography of the Social Sciences (IBSS) International Bibliography of the Social Sciences International Bibliography of the Social Sciences |
DatabaseTitle | CrossRef International Bibliography of the Social Sciences (IBSS) Worldwide Political Science Abstracts |
DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) |
Database_xml | – sequence: 1 dbid: 0YH name: Taylor & Francis Open Access url: https://www.tandfonline.com sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Military & Naval Science |
EISSN | 1743-937X |
EndPage | 567 |
ExternalDocumentID | 10_1080_01402390_2020_1732354 1732354 |
Genre | Original Articles |
GroupedDBID | -~X .7I .QK 0BK 0R~ 0YH 29L 2DF 3R3 3YN 4.4 42H 42P 5GY 5VS AAAVI AAGZJ AAMFJ AAMIU AAPUL AATTQ AAZMC ABCCY ABFIM ABJNI ABLIJ ABLJU ABPEM ABPTX ABTAI ABXUL ABXYU ABZLS ACGFO ACGFS ACHQT ACLSK ACTIO ACTOA ADAHI ADCVX ADKVQ ADLRE ADXPE AECIN AEGYZ AEISY AEKEX AEOZL AEPSL AEYOC AEZRU AFWLO AGDLA AGMYJ AGRBW AHDZW AIJEM AJWEG AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CCCUG CQ1 CS3 DGFLZ DKSSO DU5 EBS EOKQO E~B E~C G-F GTTXZ HF~ HZ~ IPNFZ J.O KYCEM LJTGL M4Z NA5 O-. O9- P2P PQQKQ RIG RNANH ROSJB RSYQP S-F STATR TBQAZ TDBHL TEY TFH TFL TFW TN5 TNTFI TRJHH UT5 UT9 VAE VQA ~01 ~45 ~S~ AAYXX ADMHG CITATION H13 TUROJ 7UB 8BJ FQK JBE TGHSC |
ID | FETCH-LOGICAL-c385t-a8bade058edbe526eea1b3610df674a770c99c7538fb2a7e17d0d06dd07e81493 |
IEDL.DBID | 0YH |
ISSN | 0140-2390 |
IngestDate | Tue Nov 19 06:53:29 EST 2024 Fri Dec 06 02:27:35 EST 2024 Mon Jul 01 06:30:20 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | open-access: http://creativecommons.org/licenses/by-nc-nd/4.0/: http://creativecommons.org/licenses/by-nc-nd/4.0/: This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c385t-a8bade058edbe526eea1b3610df674a770c99c7538fb2a7e17d0d06dd07e81493 |
OpenAccessLink | https://www.tandfonline.com/doi/abs/10.1080/01402390.2020.1732354 |
PQID | 2692874439 |
PQPubID | 31501 |
PageCount | 34 |
ParticipantIDs | proquest_journals_2692874439 informaworld_taylorfrancis_310_1080_01402390_2020_1732354 crossref_primary_10_1080_01402390_2020_1732354 |
PublicationCentury | 2000 |
PublicationDate | 2022-06-07 |
PublicationDateYYYYMMDD | 2022-06-07 |
PublicationDate_xml | – month: 06 year: 2022 text: 2022-06-07 day: 07 |
PublicationDecade | 2020 |
PublicationPlace | London |
PublicationPlace_xml | – name: London |
PublicationTitle | Journal of strategic studies |
PublicationYear | 2022 |
Publisher | Routledge Taylor & Francis Ltd |
Publisher_xml | – name: Routledge – name: Taylor & Francis Ltd |
References | cit0110 cit0075 cit0076 cit0073 cit0071 cit0072 cit0070 Smeets Max (cit0126) 2018; 12 cit0118 cit0119 cit0117 cit0115 cit0079 cit0112 cit0113 cit0066 cit0067 cit0100 cit0064 cit0065 cit0063 cit0061 Healey Jason (cit0059) 2013 Kello Lucas (cit0069) 2012 Yould Rachel (cit0148) 2003 cit0109 cit0107 cit0108 cit0105 cit0106 cit0103 cit0104 cit0068 cit0101 cit0102 cit0011 cit0099 cit0132 cit0012 cit0133 cit0097 cit0130 cit0098 cit0131 cit0095 cit0096 cit0093 cit0094 cit0091 cit0092 cit0090 Mahnken Thomas G. (cit0088) 2011; 2 Wheaton Kristan J. (cit0146) 2006; 17 Farwell James P. (cit0040) 2011; 53 Arquilla John (cit0005) 2001 cit0019 cit0017 Rid Thomas (cit0111) 2013 cit0138 cit0015 cit0136 cit0137 cit0013 cit0134 cit0014 Cheung Tai Ming (cit0020) 2009 cit0135 cit0001 cit0089 Sanger David. E. (cit0116) 2012 cit0122 cit0120 cit0084 cit0085 cit0083 Krepinevich Andrew F. (cit0074) 2002 Segal Adam (cit0121) 2016 Lynn William J (cit0086) 2010; 89 cit0008 Gabi Siboni (cit0045) 2012; 4 cit0127 cit0007 cit0128 cit0004 cit0125 cit0002 cit0123 cit0003 cit0124 cit0033 cit0031 cit0032 cit0150 cit0030 Eneken Tikk (cit0034) 2008 Bendrath Ralf (cit0009) 2001; 7 cit0039 cit0037 Cavelty Myriam Dunn (cit0018) 2008 cit0038 cit0035 cit0036 cit0022 cit0143 cit0023 cit0141 cit0142 cit0140 Tikk Eneken (cit0139) 2008 Hollis David M. (cit0062) 2011 Libicki Martin (cit0077) 2009 Carson Austin (cit0016) 2018 Lynn William J (cit0087) 2010 Lin Herbert (cit0081) 2016 cit0028 cit0029 cit0026 cit0147 cit0027 cit0024 cit0145 cit0025 cit0055 cit0056 cit0053 cit0051 cit0052 cit0050 Hayden Michael (cit0057) 2016 Zetter Kim (cit0149) 2014 Bendrath Ralf (cit0010) 2004 Liff Adam P. (cit0080) Ruys Tom (cit0114) 2010 cit0058 cit0044 Henderson Scott J. (cit0060) 2007 Clarke Richard A. (cit0021) 2010 cit0042 cit0043 cit0041 Smeets Max (cit0129) Arquilla John (cit0006) Lin Herbert (cit0082) 2018 Warner Michael (cit0144) 2019; 63 Libicki Martin C. (cit0078) 2012; 8 Harknett Richard. (cit0054) 1998 cit0048 cit0049 cit0046 cit0047 |
References_xml | – ident: cit0038 – ident: cit0119 doi: 10.1109/MC.2002.1106187 – ident: cit0118 – ident: cit0004 doi: 10.1080/01495939308402915 – ident: cit0015 – ident: cit0147 – ident: cit0044 – ident: cit0099 doi: 10.1007/s10676-005-4582-3 – ident: cit0123 doi: 10.1162/ISEC_a_00267 – ident: cit0067 – ident: cit0084 doi: 10.1162/ISEC_a_00189 – ident: cit0101 – ident: cit0103 doi: 10.1016/j.tvjl.2010.05.029 – ident: cit0134 doi: 10.1080/01402390.2012.730485 – volume-title: Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age year: 2016 ident: cit0121 contributor: fullname: Segal Adam – volume: 7 start-page: 80 year: 2001 ident: cit0009 publication-title: Information & Security contributor: fullname: Bendrath Ralf – volume-title: ‘Armed Attack’ and Article 51 of the UN Charter year: 2010 ident: cit0114 contributor: fullname: Ruys Tom – ident: cit0073 – ident: cit0029 – ident: cit0142 doi: 10.1177/0022343313518940 – ident: cit0050 – ident: cit0013 doi: 10.1080/09636412.2017.1306396 – ident: cit0065 doi: 10.1080/01402390.2012.739561 – ident: cit0109 doi: 10.1080/01402390.2011.608939 – ident: cit0058 – ident: cit0130 – ident: cit0083 doi: 10.1080/09636412.2013.816122 – ident: cit0115 – ident: cit0096 – volume: 53 start-page: 23 issue: 1 year: 2011 ident: cit0040 publication-title: Survival: Global Politics and Strategy doi: 10.1080/00396338.2011.555586 contributor: fullname: Farwell James P. – ident: cit0089 doi: 10.1080/10630732.2011.578411 – ident: cit0035 – ident: cit0150 – ident: cit0041 – volume-title: A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 year: 2013 ident: cit0059 contributor: fullname: Healey Jason – volume: 17 start-page: 319 issue: 2 year: 2006 ident: cit0146 publication-title: Stanford Law & Policy Review contributor: fullname: Wheaton Kristan J. – ident: cit0003 – volume-title: Fortifying China: The Struggle to Build a Modern Defense Economy year: 2009 ident: cit0020 contributor: fullname: Cheung Tai Ming – ident: cit0076 – ident: cit0049 – ident: cit0133 – ident: cit0079 doi: 10.1080/01402390.2012.663252 – ident: cit0093 – ident: cit0055 – ident: cit0091 doi: 10.1111/j.1540-5842.2009.01103.x – start-page: 14 volume-title: Proceedings of the 7th European Conference on Information Warfare and Security year: 2008 ident: cit0034 contributor: fullname: Eneken Tikk – ident: cit0112 – ident: cit0124 doi: 10.23919/CYCON.2017.8240326 – ident: cit0122 – volume-title: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon year: 2014 ident: cit0149 contributor: fullname: Zetter Kim – ident: cit0127 doi: 10.1080/14702436.2018.1508349 – ident: cit0017 – ident: cit0094 doi: 10.1002/9781119183440 – ident: cit0030 doi: 10.1177/0967010611431079 – ident: cit0046 – ident: cit0070 doi: 10.1162/ISEC_a_00138 – ident: cit0048 doi: 10.1162/isec_a_00337 – ident: cit0052 – ident: cit0085 doi: 10.1162/ISEC_a_00189 – ident: cit0023 – ident: cit0136 – volume-title: Cyber War year: 2010 ident: cit0021 contributor: fullname: Clarke Richard A. – ident: cit0117 – ident: cit0031 doi: 10.3390/fi4030672 – ident: cit0037 – ident: cit0012 – ident: cit0043 – ident: cit0068 – ident: cit0092 doi: 10.1080/01402390.2012.742013 – volume-title: Cyber Attacks Against Georgia year: 2008 ident: cit0139 contributor: fullname: Tikk Eneken – volume: 2 start-page: 53 volume-title: America’s Cyber Future: Security and Prosperity in the Information Age year: 2011 ident: cit0088 contributor: fullname: Mahnken Thomas G. – ident: cit0100 – volume-title: Secret Wars: Covert Conflict in International Politics year: 2018 ident: cit0016 contributor: fullname: Carson Austin – ident: cit0026 – volume-title: Cyberwar and Cyberdeterrence year: 2009 ident: cit0077 contributor: fullname: Libicki Martin – ident: cit0001 – ident: cit0032 – ident: cit0047 doi: 10.1162/ISEC_a_00136 – ident: cit0071 doi: 10.2307/j.ctt1trkjd1 – ident: cit0131 – volume: 63 start-page: 33 issue: 4 year: 2019 ident: cit0144 publication-title: Studies in Intelligence contributor: fullname: Warner Michael – ident: cit0145 doi: 10.1017/CBO9780511612183 – ident: cit0063 – volume: 12 start-page: 90 issue: 3 year: 2018 ident: cit0126 publication-title: Strategic Studies Quarterly contributor: fullname: Smeets Max – ident: cit0129 publication-title: Cyber Defense Review contributor: fullname: Smeets Max – ident: cit0105 – volume-title: Cyber-Security and Threat Politics US Efforts to Secure in the Information Age year: 2008 ident: cit0018 contributor: fullname: Cavelty Myriam Dunn – ident: cit0120 – ident: cit0002 – ident: cit0106 doi: 10.1093/acprof:oso/9780190201265.003.0006 – volume-title: Networks and Netwars: The Future of Terror, Crime, and Militancy year: 2001 ident: cit0005 contributor: fullname: Arquilla John – volume-title: Paper presented at: International Studies Association Annual Convention year: 2004 ident: cit0010 contributor: fullname: Bendrath Ralf – ident: cit0108 – ident: cit0090 doi: 10.1017/9781316422724 – ident: cit0025 – volume: 8 start-page: 325 issue: 2 year: 2012 ident: cit0078 publication-title: I/S A Journal of Law and Policy for the Information Society contributor: fullname: Libicki Martin C. – ident: cit0014 – ident: cit0039 – ident: cit0141 doi: 10.1080/01436597.2013.802502 – volume-title: Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security year: 2003 ident: cit0148 contributor: fullname: Yould Rachel – ident: cit0140 – ident: cit0066 – ident: cit0102 – ident: cit0051 – volume: 89 start-page: 97 issue: 5 year: 2010 ident: cit0086 publication-title: Foreign Affairs contributor: fullname: Lynn William J – volume-title: Playing the Edge: American Intelligence in the Age of Terror year: 2016 ident: cit0057 contributor: fullname: Hayden Michael – ident: cit0072 – ident: cit0137 – ident: cit0028 – volume-title: Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations year: 2018 ident: cit0082 contributor: fullname: Lin Herbert – volume: 4 start-page: 101 issue: 3 year: 2012 ident: cit0045 publication-title: Military and Strategic Affairs contributor: fullname: Gabi Siboni – ident: cit0097 – ident: cit0138 doi: 10.1080/13567888.2017.1335101 – ident: cit0042 – ident: cit0036 – ident: cit0061 – volume-title: In Athena’s Camp: Preparing for Conflict in the Information Age ident: cit0006 contributor: fullname: Arquilla John – year: 2011 ident: cit0062 publication-title: Small Wars Journal contributor: fullname: Hollis David M. – ident: cit0125 doi: 10.1080/01402390.2017.1288107 – ident: cit0143 doi: 10.1093/acprof:oso/9780190204792.001.0001 – ident: cit0027 – ident: cit0132 – volume-title: The Dark Visitor: Inside the World of Chinese Hackers year: 2007 ident: cit0060 contributor: fullname: Henderson Scott J. – ident: cit0056 – volume-title: Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power year: 2012 ident: cit0116 contributor: fullname: Sanger David. E. – ident: cit0113 – volume-title: Presentation, International Security Program Seminar Series, Cambridge, Mass year: 2012 ident: cit0069 contributor: fullname: Kello Lucas – year: 2016 ident: cit0081 publication-title: Journal of International Affairs contributor: fullname: Lin Herbert – ident: cit0098 – ident: cit0128 doi: 10.23919/CYCON.2018.8405010 – volume-title: Cyber War Will Not Take Place year: 2013 ident: cit0111 contributor: fullname: Rid Thomas – volume-title: The Military-Technical Revolution: A Preliminary Assessment year: 2002 ident: cit0074 contributor: fullname: Krepinevich Andrew F. – ident: cit0064 – ident: cit0008 – ident: cit0033 – ident: cit0104 – start-page: 13 issue: 5 year: 2010 ident: cit0087 publication-title: Foreign Affairs contributor: fullname: Lynn William J – ident: cit0024 doi: 10.1080/18335330.2012.653198 – ident: cit0110 – ident: cit0135 – ident: cit0007 doi: 10.1017/S0020818305050010 – volume-title: The Absolute Weapon Revisited: Nuclear Arms and the Emerging International Order year: 1998 ident: cit0054 contributor: fullname: Harknett Richard. – ident: cit0107 doi: 10.1162/016228803322427965 – ident: cit0022 – ident: cit0053 doi: 10.4324/9780203630174 – start-page: 134 ident: cit0080 publication-title: Journal of Strategic Studies contributor: fullname: Liff Adam P. – ident: cit0019 – ident: cit0011 doi: 10.1080/19445571.2011.636956 – ident: cit0075 doi: 10.1109/MSP.2011.67 – ident: cit0095 |
SSID | ssj0018853 |
Score | 2.5120208 |
Snippet | While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber... |
SourceID | proquest crossref informaworld |
SourceType | Aggregation Database Publisher |
StartPage | 534 |
SubjectTerms | Campaigns China Coercion cyber campaigns cyber espionage cyber operations Cyberwar Electronic warfare Internet Presumption Russia Tactics |
Title | Cyber campaigns and strategic outcomes |
URI | https://www.tandfonline.com/doi/abs/10.1080/01402390.2020.1732354 https://www.proquest.com/docview/2692874439 |
Volume | 45 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8MwGA7qLl7ETzadIwfZrdo2bZIeZTjKYDvIBnoK-RQvnazdYf_eJE3FIeLBayGBPM378SRvnheAO8qxdXrGRNiG5yhTEkXc-JtCzUkibQIu3QPn-QKXq2z2knfVhHUoq3Qc2rRCEd5XO-Pmou4q4h4cKUgtV7fsLrWfCEpRnh2CnpMqd00M4tfy6yKB0laI0lUxujHdI57fptkLT3vipT-ctY9A01NwElJH-Nj-6zNwoKtz0J97me3NDo7hgtttA4O1XoDxZCf0Bkonqfj-VtXQLhjWQY1WwvW2scvW9SVYTZ-WkzIKbREiiWjeRJwKrnScU62EzlOsNU8EsmmQMphknJBYFoW0NIQakXKiE6JiFWOlYqKpJUToChxV60r3ARRGJSqRWhKOMmUzLSkSzIlUCCvLPPgA3HdosI9W_YIlnahogI85-FiAbwCK75ixxh87mLZHCEN_jB12ALNgSDVLceEV-lFx_Y-pb8Bx6p4tuNMTMgRHzWarb20y0YiR3y4j0Fs-z8ryE7zuvxo |
link.rule.ids | 314,780,784,27502,27924,27925,59143,59144,59651,60440 |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELagHWDhjVoo4AF1S0nixHZGVIFCaTugVupm-RWEkFLUpEP59dh5oBaEGLpG8iNn--4---47AG4px0bpJYmDjXl2AiWRw5PipVBz4knjgEub4Dwa43gaDGbhbC0XxoZVWgydlEQRha62h9teRtchcXcWFfgGrBt455tPBPkoDHZBM4xwaA5nc_IyiOPvtwRKSy5KG8hoW9V5PH91tGGhNvhLf-nrwgg9HgJZT7-MPXnvLXPRk58_mB23-78jcFD5qPC-3FTHYEenJ6A1Kvi8FyvYhWNu9ies1MIp6PZXQi-gtNyNb69pBs3IMKtobyWcL3Mzvs7OwPTxYdKPnar-giMRDXOHU8GVdkOqldChj7XmnkDG31IJJgEnxJVRJA3eoYnwOdEeUa5ysVIu0dQgL3QOGuk81S0ARaI85UktCUeBMi6dFB7mRCqElYE4vA16tczZR0mzwbyavbSSBrPSYJU02iBaXxmWF_cbSVmMhKF_2nbqZWTVic2Yj6OiFACKLrbo-gbsxZPRkA2fxs-XYN-3uRL2yoZ0QCNfLPWV8WBycV1t0S-U-eJ7 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEB50BfHiW3ysmoN469o2bdIeZXVZV3cRUfAW8hQRVtl2D-uvN2lTcRXx4LWQRyeTyXzJzDcAJxkn1ugZExB7PAeJkjjgpnop1JxG0jrg0iU4D0ek_5AMHtMmmrDwYZUOQ5uaKKKy1W5zvynTRMSdOVAQW6xu0V1sP1Ec4zRZhCXiyie3YOn-btDvfz4lZFlNReniGF2rJo3nt47mDqg5-tIf5ro6g3prIJrZ16EnL51pKTry_Rux479-bx1WvYeKzmuV2oAFPd6E3WHF5j2ZoVM04lY7kTcKW3DanQk9QdIxNz4_jQtkB0aFJ72V6HVa2uF1sQ0Pvcv7bj_w1RcCibO0DHgmuNJhmmkldBoTrXkksPW2lCE04ZSGMs-lRTuZETGnOqIqVCFRKqQ6s7gL70Br_DrWu4CEUZGKpJaU40RZh06KiHAqFSbKAhy-B51G5OytJtlgUcNd6qXBnDSYl8Ye5F8XhpXV7YapS5Ew_EfbdrOKzO_XgsUkrwoB4Hz_H10fw_LtRY_dXI2uD2AldokS7r6GtqFVTqb60LovpTjyCvoB2fnhHw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+campaigns+and+strategic+outcomes&rft.jtitle=Journal+of+strategic+studies&rft.au=Harknett%2C+Richard+J.&rft.au=Smeets%2C+Max&rft.date=2022-06-07&rft.issn=0140-2390&rft.eissn=1743-937X&rft.volume=45&rft.issue=4&rft.spage=534&rft.epage=567&rft_id=info:doi/10.1080%2F01402390.2020.1732354&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_01402390_2020_1732354 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-2390&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-2390&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-2390&client=summon |