Origin: U.S.A.
(Import costs included in the price)
It will be shipped from our warehouse between Tuesday, July 09 and Friday, July 19.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.
Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies
Mary Manjikian
Synopsis "Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies"
In recent years, analysts have begun discussing strategies for securing entities in cyberspaceÑincluding the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situationsÑ such as nuclear war, or the use of biological or chemical weaponsÑin which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace.