+ MUSE Alert

In this Issue

Table of Contents

  1. Editor’s Note
  2. Ian Prasad Philbrick
  3. p. 1
  4. DOI: https://doi.org/10.1353/gia.2016.0029
  5. restricted access

Forum: The Role of Strategy in Securing a Nation in the Cyber Domain

  1. Introduction
  2. Catherine Lotrionte, Anthony Clark Arend
  3. pp. 3-4
  4. DOI: https://doi.org/10.1353/gia.2016.0030
  5. restricted access
  1. Reflections on the New Department of Defense Cyber Strategy: What It Says, What It Doesn’t Say
  2. Herbert S. Lin
  3. pp. 5-13
  4. DOI: https://doi.org/10.1353/gia.2016.0031
  5. restricted access
  1. Respecting the Digital Rubicon: How the Department of Defense Should Defend the U.S. Homeland
  2. Rob K. Knake
  3. pp. 14-20
  4. DOI: https://doi.org/10.1353/gia.2016.0032
  5. restricted access
  1. The U.S. Department of Defense Cyber Strategy: A Call to Action for Partnership
  2. Michele Myauo
  3. pp. 21-29
  4. DOI: https://doi.org/10.1353/gia.2016.0033
  5. restricted access

Global Governance

  1. What Happens If Cyber Norms Are Agreed To?
  2. Emilio Iasiello
  3. pp. 30-37
  4. DOI: https://doi.org/10.1353/gia.2016.0034
  5. restricted access
  1. Dysfunction, Incentives, and Trade: Rehabilitating U.S.-China Cyber Relations
  2. Rebecca Liao
  3. pp. 38-46
  4. DOI: https://doi.org/10.1353/gia.2016.0035
  5. restricted access
  1. International Cyber Norms Dialogue as an Exercise of Normative Power
  2. Eneken Tikk-Ringas
  3. pp. 47-59
  4. DOI: https://doi.org/10.1353/gia.2016.0036
  5. restricted access

Country in Focus

  1. Inter-Korean Rivalry in the Cyber Domain: The North Korean Cyber Threat in the Sŏn’gun Era
  2. Daniel A. Pinkston
  3. pp. 60-76
  4. DOI: https://doi.org/10.1353/gia.2016.0037
  5. restricted access

Safety & Security

  1. A Three-Layer Framework for a Comprehensive National Cyber-security Strategy
  2. Eviatar Matania, Lior Yoffe, Michael Mashkautsan
  3. pp. 77-84
  4. DOI: https://doi.org/10.1353/gia.2016.0038
  5. restricted access
  1. The Cybersecurity Storm Front—Forces Shaping the Cybersecurity Landscape: A Framework for Analysis
  2. Samuel Sanders Visner
  3. pp. 85-99
  4. DOI: https://doi.org/10.1353/gia.2016.0039
  5. restricted access

Military Matters

  1. Constraining Norms for Cyber Warfare Are Unlikely
  2. Brian M. Mazanec
  3. pp. 100-109
  4. DOI: https://doi.org/10.1353/gia.2016.0040
  5. restricted access