dc.contributor.author | Gunneriusson, H. | |
dc.contributor.author | Ottis, R. | |
dc.date.accessioned | 2022-08-19T05:46:31Z | |
dc.date.available | 2022-08-19T05:46:31Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Gunneriusson, H., & Ottis, R. (2013). Cyberspace from the Hybrid Threat Perspective. <i>Journal of Information Warfare</i>, <i>12</i>(3), 67-77. <a href="https://www.jinfowar.com/journal/volume-12-issue-3/cyberspace-hybrid-threat-perspective" target="_blank">https://www.jinfowar.com/journal/volume-12-issue-3/cyberspace-hybrid-threat-perspective</a> | |
dc.identifier.other | CONVID_148917726 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/82706 | |
dc.description.abstract | Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are or likely will be relevant to the military community. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Peregrine Technical Solutions, LLC | |
dc.relation.ispartofseries | Journal of Information Warfare | |
dc.relation.uri | https://www.jinfowar.com/journal/volume-12-issue-3/cyberspace-hybrid-threat-perspective | |
dc.rights | In Copyright | |
dc.subject.other | hybrid threat | |
dc.subject.other | cyberspace | |
dc.subject.other | cyber operation | |
dc.subject.other | Internet | |
dc.subject.other | military | |
dc.title | Cyberspace from the Hybrid Threat Perspective | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202208194247 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 67-77 | |
dc.relation.issn | 1445-3312 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 12 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Peregrine Technical Solutions, 2013 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | kybersodankäynti | |
dc.subject.yso | hybridisota | |
dc.subject.yso | kyberavaruus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27779 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p28308 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7989 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A1 | |