Jump to ContentJump to Main Navigation

You are looking at 1-9 of 9 items

  • Keywords: Attribution x
Clear All Modify Search

View:

Inside the Enemy's Computer: Identifying Cyber Attackers

Clement Guitton

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.001.0001
Subject:
Political Science, Security Studies

Attribution — tracing those responsible for a cyber attack — is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current ... More


Who Runs This Disaster? The Media and the Blame Game

Andrea Miller, Shearon Roberts, and Victoria LaPoe

in Oil and Water: Media Lessons from Hurricane Katrina and the Deepwater Horizon Disaster

Published in print:
2014
Published Online:
September 2014
ISBN:
9781617039720
eISBN:
9781626740174
Item type:
chapter
Publisher:
University Press of Mississippi
DOI:
10.14325/mississippi/9781617039720.003.0005
Subject:
Society and Culture, Media Studies

“Obama’s Katrina” was used by the media within the first week of the Deepwater Horizon Oil Disaster. Was the media’s comparison automatic and/or inevitable? This chapter will examine the narratives ... More


Policy Preference in Response to Terrorism: The Role of Emotions, Attributions, and Appraisals

Geoffrey Wetherell, Bradley M. Weisz, Ryan M. Stolier, Adam J. Beavers, and Melody S. Sadler

in The Political Psychology of Terrorism Fears

Published in print:
2013
Published Online:
January 2014
ISBN:
9780199925926
eISBN:
9780199380664
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199925926.003.0007
Subject:
Psychology, Social Psychology

This chapter examines the interplay between emotion and cognition in relation to policy preferences in the wake of terrorist attacks. Specifically, two theories of emotion (Attribution theory and ... More


Introduction

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0001
Subject:
Political Science, Security Studies

The introduction sets to explain why it is important to look at the question of attribution: in short, it is central to defense and deterrence strategies. Furthermore, the introduction presents the ... More


Modelling Attribution

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0002
Subject:
Political Science, Security Studies

How and why does the attribution of an incident become the responsibility of the executive rather than the judiciary? How do the processes of attributing a criminal incident and attributing a ... More


Standards of Proof

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0004
Subject:
Political Science, Security Studies

When can we consider that an attack is attributed, if attribution is not dependent on court proceedings? Do we need "appropriate" standards for the attribution of cyber attacks? What would such ... More


Private Companies

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0005
Subject:
Political Science, Security Studies

What specific constraints do private companies face? What is the role of private companies in outing state-sponsored attacks? States accused of cyber attacks use three commonly recurring arguments to ... More


Time

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0006
Subject:
Political Science, Security Studies

How important is the time constraint for attribution? How has the time constraint evolved? And what constitutes an appropriate time for attributing cyber attacks? Timing plays a significant role in ... More


Limitations, Objections, and the Future of the Cybersecurity Dilemma

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0008
Subject:
Political Science, Security Studies

This chapter considers three counterarguments to the cybersecurity dilemma logic. It shows that even if the cybersecurity threat does not pose an existential risk, it is vitally important and can ... More


View: