Näytä suppeat kuvailutiedot

dc.contributor.authorTurunen, Maija
dc.contributor.authorKari, Martti
dc.contributor.editorGriffin, Robert P.
dc.contributor.editorTatarand, Unal
dc.contributor.editorYankson, Benjamin
dc.date.accessioned2022-03-21T10:33:39Z
dc.date.available2022-03-21T10:33:39Z
dc.date.issued2022
dc.identifier.citationTurunen, M., & Kari, M. (2022). The Cumulative Cyber Deterrence. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), <i>ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security</i> (17, pp. 433-439). Academic Conferences International. The proceedings of the 17th international conference on cyber warfare and security. <a href="https://doi.org/10.34190/iccws.17.1.55" target="_blank">https://doi.org/10.34190/iccws.17.1.55</a>
dc.identifier.otherCONVID_104577943
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/80266
dc.description.abstractThe cumulative cyber deterrence can be seen as a concept in which increasing the weight of different means and their use increases the deterrent effect on a common level or on selected adversaries. Cumulative cyber deterrence may include all traditional options of deterrence, and can be active or passive. Active deterrence can be characterized as targeting specific threats and actors, as a deterrent consisting of several different methods, while passive deterrence is a form of deterrence commonly targeted at all the potential adversaries. The cumulative cyber deterrence can be an independent type of deterrence or part of a state’s overall deterrence. This paper approaches the concept of cumulative cyber deterrence from a military perspective. The purpose is to determine what factors can be formed by cumulative cyber deterrence. It describes how cumulative deterrence will change and be affected and what problems can be associated with that concept. The aim is to find answers to these questions by looking at the way how Israel and Russia use cumulative cyber deterrence as part of their overall deterrence. In its theoretical context, this paper is based on the theory of the character of war. Through the theory of character of war and utilizing the concept of reflexive control, an attempt is made to explain the position of cumulative cyber deterrence as part of overall deterrence. Integrative literature analysis has been used as the research method. The key conclusion of the paper is that creating a credible cyber deterrent is an affect and cost-effective way to increase overall deterrence. However, this presupposes that the state also has offensive cyber methods at its disposal and is able to credibly communicate their existence and the will to use them if necessary. The concept of cumulative cyber deterrence depends on the other means of deterrence available to the state. Both Israel and Russia have all these qualities. A key difference in the deterrence strategies of these states is that Israel uses cumulative methods to make it clear where the red lines are, while Russia’s strategic goal is to blur themen
dc.format.extent645
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the 17th international conference on cyber warfare and security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othercyber deterrence
dc.subject.otherRussia
dc.subject.otherIsrael
dc.subject.otherred lines
dc.titleThe Cumulative Cyber Deterrence
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202203211964
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTutkintokoulutusfi
dc.contributor.oppiaineDegree Educationen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-26-9
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange433-439
dc.relation.issn2048-9870
dc.relation.numberinseries1
dc.relation.volume17
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 International Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.subject.ysokyberturvallisuus
dc.subject.ysovaltiot
dc.subject.ysokybersodankäynti
dc.subject.ysoturvallisuuspolitiikka
dc.subject.ysopelotteet
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p3215
jyx.subject.urihttp://www.yso.fi/onto/yso/p27779
jyx.subject.urihttp://www.yso.fi/onto/yso/p9566
jyx.subject.urihttp://www.yso.fi/onto/yso/p10846
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/iccws.17.1.55
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0